BSOD: za każdym razem około 5 minut po włączeniu komputera
Hej,
nie jestem pewien czy to odpowiedni dział, ale lepszego nie znalazłem. Mam taki bardzo wkurzający problem - po ok. 5 minut po każdym uruchomieniu komputera, dostaję niebieski ekran i komputer restartuje się. Po restarcie już działa w porządku (czasami zdarzy się, że BSOD pokaże się jeszcze raz).
Nie jestem pewien jakie logi przydadzą się do analizy, ale wklejam dumpy z programu BlueScreenView. Jak będzie trzeba, wykonam dodatkowe testy.
Będę bardzo wdzięczny za wszelką pomoc!
No jest sporo różnych ale ten raport jest bezwartościowy do analizy.
Pozrzucaj pliki *.dmp z C:\windows\minidump
Podrzuć także plik dziennika systemowego c:\Windows\System32\winevt\Logs\system.evtx
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu. Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(30.10.2012 23:41)thermalfake napisał(a): No jest sporo różnych ale ten raport jest bezwartościowy do analizy.
Pozrzucaj pliki *.dmp z C:\windows\minidump
Podrzuć także plik dziennika systemowego c:\Windows\System32\winevt\Logs\system.evtx
Dziękuję bardzo za odpowiedź! Pliki, o których piszesz, są w załączniku.
Pokręciłeś pliki
c:\Windows\System32\winevt\Logs\system.evtx a nie setup.evtx
Na razie same zrzuty, potem opiszę co i jak.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\103012-23805-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`0404f000 PsLoadedModuleList = 0xfffff800`04293670
Debug session time: Tue Oct 30 13: 57: 18.117 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 07: 09.507
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff800041087c7}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800041087c7
TRAP_FRAME: fffff880039aa600 -- (.trap 0xfffff880039aa600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800040f78f0 rsp=fffff880039aa790 rbp=fffff880039ab648
r8=fffff880039aaea0 r9=fffff880039aa820 r10=0000000000000000
r11=fffff880039aa700 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlDispatchException+0x440:
fffff800`040f78f0 0f84d4ca0000 je nt! ? : FNODOBFM: `string'+0x3006f (fffff800`041043ca) [br=0]
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800040cd569 to fffff800040cdfc0
Unloaded modules:
fffff880`01962000 fffff880`01970000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01970000 fffff880`0197c000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0197c000 fffff880`01985000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01985000 fffff880`01998000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 0000007F
Arguments 00000000`00000008 00000000`80050031 00000000`000006f8 fffff800`041087c7
[CPU Information]
~MHz = REG_DWORD 2341
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 23 Stepping 7
ProcessorNameString = REG_SZ Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz
Update Signature = REG_BINARY 0,0,0,0,5,7,0,0
Update Status = REG_DWORD 0
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 70500000000
Machine ID Information [From Smbios 2.5, DMIVersion 0, Size=2278]
BiosMajorRelease = 8
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 0418
BiosReleaseDate = 12/09/2008
SystemManufacturer = PCF
SystemProductName = System Product Name
SystemFamily = To Be Filled By O.E.M.
SystemVersion = System Version
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASUSTeK Computer INC.
BaseBoardProduct = P5QL-EM
BaseBoardVersion = Rev X.0x
CPUID: "Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz"
MaxSpeed: 2330
CurrentSpeed: 2341
[SMBIOS Data Tables v2.5]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2278 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version 0418
BIOS Starting Address Segment f000
BIOS Release Date 12/09/2008
BIOS ROM Size 100000
BIOS Characteristics
04: - ISA Supported
07: - PCI Supported
09: - Plug and Play Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
14: - ESCD Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 8
BIOS Minor Revision 14
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer PCF
Product Name System Product Name
Version System Version
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To Be Filled By O.E.M.
Family To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK Computer INC.
Product P5QL-EM
Version Rev X.0x
Serial Number
Asset Tag
Feature Flags 09h
1638284660: - c
1638284620: - c
Location To Be Filled By O.E.M.
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer Chassis Manufacture
Chassis Type Desktop
Version Chassis Version
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 1
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 40 - Handle 0004h]
Socket Designation LGA775
Processor Type Central Processor
Processor Family 01h - Other
Processor Manufacturer Intel
Processor ID 77060100fffbebbf
Processor Version Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz
Processor Voltage 8ch - 1.2V
External Clock 333MHz
Max Speed 3800MHz
Current Speed 2333MHz
Status Enabled Populated
Processor Upgrade Specification Reserved
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle 0007h
Serial Number
Asset Tag Number
Part Number To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0080h - 128K
Installed Size 0080h - 128K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type ParitySingle-Bit ECC
System Cache Type Data
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 1000h - 4096K
Installed Size 1000h - 4096K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Instruction
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0007h]
Socket Designation L3-Cache
Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
Maximum Cache Size 0000h - 0K
Installed Size 0000h - 0K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Onboard Devices Information (Type 10) - Length 6 - Handle 002dh]
Number of Devices 1
01: Type Ethernet [enabled]
01: Description Onboard Ethernet
[OEM Strings (Type 11) - Length 5 - Handle 002eh]
Number of Strings 4
1 002215D6FD62
2 To Be Filled By O.E.M.
3 To Be Filled By O.E.M.
4 To Be Filled By O.E.M.
[Physical Memory Array (Type 16) - Length 15 - Handle 0031h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 8388608KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 0032h]
Starting Address 00000000h
Ending Address 003fffffh
Memory Array Handle 0031h
Partition Width 04
[Memory Device (Type 17) - Length 27 - Handle 0033h]
Physical Memory Array Handle 0031h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM0
Bank Locator BANK0
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer0
Serial Number
Asset Tag Number
Part Number PartNum0
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0034h]
Starting Address 00000000h
Ending Address 001fffffh
Memory Device Handle 0033h
Mem Array Mapped Adr Handle 0032h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0035h]
Physical Memory Array Handle 0031h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width 64 bits
Size [Not Populated]
Form Factor 01h - Other
Device Set [None]
Device Locator DIMM1
Bank Locator BANK1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer Manufacturer1
Serial Number
Asset Tag Number
Part Number PartNum1
[Memory Device (Type 17) - Length 27 - Handle 0037h]
Physical Memory Array Handle 0031h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM2
Bank Locator BANK2
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer2
Serial Number
Asset Tag Number
Part Number PartNum2
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0038h]
Starting Address 00200000h
Ending Address 003fffffh
Memory Device Handle 0037h
Mem Array Mapped Adr Handle 0032h
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0039h]
Physical Memory Array Handle 0031h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width 64 bits
Size [Not Populated]
Form Factor 01h - Other
Device Set [None]
Device Locator DIMM3
Bank Locator BANK3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer Manufacturer3
Serial Number
Asset Tag Number
Part Number PartNum3
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102912-23150-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`0400f000 PsLoadedModuleList = 0xfffff800`04253670
Debug session time: Mon Oct 29 18: 43: 13.389 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 01: 12.168
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88001269f50, Address of the instruction which caused the bugcheck
Arg3: fffff8800680cd60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102912-22713-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`0401b000 PsLoadedModuleList = 0xfffff800`0425f670
Debug session time: Mon Oct 29 18: 48: 38.813 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 01: 51.592
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffffba0f0000, 2, 0, fffff8000419beaf}
Probably caused by : hardware ( nt!EtwTraceContextSwap+6f )
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffba0f0000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000419beaf, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800042c9100
ffffffffba0f0000
CURRENT_IRQL: 2
FAULTING_IP:
nt!EtwTraceContextSwap+6f
fffff800`0419beaf 84840000000fba test byte ptr [rax+rax-45F10000h],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8bb50 -- (.trap 0xfffff88002f8bb50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008e571cf
rdx=fffff88002f6dfc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000419beaf rsp=fffff88002f8bce0 rbp=fffff88002f8bdb0
r8=fffffa80036eb0c8 r9=0000000000000000 r10=fffffffffffffffb
r11=fffff88002f63180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!EtwTraceContextSwap+0x6f:
fffff800`0419beaf 84840000000fba test byte ptr [rax+rax-45F10000h],al ds: bc98: ffffffff`ba0f0000=?
Resetting default scope
MISALIGNED_IP:
nt!EtwTraceContextSwap+6f
fffff800`0419beaf 84840000000fba test byte ptr [rax+rax-45F10000h],al
LAST_CONTROL_TRANSFER: from fffff80004099569 to fffff80004099fc0
FOLLOWUP_IP:
nt!EtwTraceContextSwap+6f
fffff800`0419beaf 84840000000fba test byte ptr [rax+rax-45F10000h],al
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!EtwTraceContextSwap+6f
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\101912-45396-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`03e0b000 PsLoadedModuleList = 0xfffff800`0404f670
Debug session time: Fri Oct 19 11: 09: 30.187 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 00: 21.576
Loading Kernel Symbols
...............................................................
.........................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck DA, {500, fffff6fc40021b90, 20, 4372}
Probably caused by : rdyboost.sys ( rdyboost!SmFpAllocate+4f )
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102912-21855-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`0405b000 PsLoadedModuleList = 0xfffff800`0429f670
Debug session time: Mon Oct 29 16: 41: 38.261 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 04: 13.635
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff80004261750, the pool entry being checked.
Arg3: fffff80004261750, the read back flink freelist value (should be the same as 2).
Arg4: fffff80004261770, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: vmware-authd.e
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800042044b3 to fffff800040d9fc0
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102812-29062-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`04007000 PsLoadedModuleList = 0xfffff800`0424b670
Debug session time: Sun Oct 28 14: 04: 42.587 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 00: 40.366
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
Unable to load image \?\C: \Program Files (x86)\CyberLink\PowerDVD\000.fcl, Win32 error 0n2
*** WARNING: Unable to verify timestamp for 000.fcl
*** ERROR: Module load completed but symbols could not be loaded for 000.fcl
Probably caused by : 000.fcl ( 000+1772 )
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 0000000000000004, Handle value being referenced.
Arg3: fffffa8007da8060, Address of the current process.
Arg4: fffff88008e01772, Address inside the driver that is performing the incorrect reference.
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102812-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`04003000 PsLoadedModuleList = 0xfffff800`04247670
Debug session time: Sun Oct 28 12: 32: 29.383 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 04: 57.772
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {2b, 2, 0, fffff80004088e20}
Probably caused by : win32k.sys ( win32k!xxxRealSleepThread+257 )
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80004088e20, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800042b1100
000000000000002b
TRAP_FRAME: fffff8800aac3980 -- (.trap 0xfffff8800aac3980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000004a8f rbx=0000000000000000 rcx=0000000000000002
rdx=000000000000000d rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004088e20 rsp=fffff8800aac3b10 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=fffffa8007682750 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KeWaitForSingleObject+0x230:
fffff800`04088e20 498b0e mov rcx,qword ptr [r14] ds: 00000000`00000000=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80004081569 to fffff80004081fc0
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\22\dump\Minidump\102712-21418-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`04050000 PsLoadedModuleList = 0xfffff800`04294670
Debug session time: Sat Oct 27 12: 10: 04.208 2012 (UTC + 1: 00)
System Uptime: 0 days 0: 04: 16.988
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff8a00e0060a0, the pool entry being checked.
Arg3: fffff8a00e006080, the read back flink freelist value (should be the same as 2).
Arg4: fffff8a00e0060a0, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800041f970f to fffff800040cefc0