SenseiMewka
Nowy
Liczba postów: 1
|
Komputer nie chce się wyłączyć + BSODy
Witam
Przez około pół roku posiadam komputer z Windowsem 7 HP 64bit. Od pewnego czasu pojawiają się blue screeny. Czasami BSOD wyskakuje kilka minut po starcie systemu. Dodatkowo dość często komputer nie chce się wyłączyć - po naciśnięciu przycisku zamknij system pozostaje na ekranie z napisem trwa zamykanie. Pomaga wtedy reset i ponowne wyłączenie komputera z ekranu logowania. Chciałbym się dowiedzieć co powoduje te błędy i jak je usunąć. Z góry dziękuję za pomoc.
Link do plików .dmp: https://www.mediafire.com/?oawyh719c1o86m5
|
thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Komputer nie chce się wyłączyć + BSODy
http://www.sevenforums.com/crash-lockup-...oting.html
http://captaindbg.com/bug-check-0x116-vi...ting-tips/
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03657000 PsLoadedModuleList = 0xfffff800`0389a6d0
Debug session time: Wed Feb 19 16: 13: 16.149 2014 (UTC + 2: 00)
System Uptime: 0 days 0: 16: 12.164
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa800b589010, fffff8800f5a1bbc, 0, d}
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+153bbc )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa800b589010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8800f5a1bbc, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 000000000000000d, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
nvlddmkm+153bbc
fffff880`0f5a1bbc 803d86de730000 cmp byte ptr [nvlddmkm+0x891a49 (fffff880`0fcdfa49)],0
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`08bd14f8 fffff880`100f4140 : 00000000`00000116 fffffa80`0b589010 fffff880`0f5a1bbc 00000000`00000000 : nt!KeBugCheckEx
fffff880`08bd1500 fffff880`100f3ec7 : fffff880`0f5a1bbc fffffa80`0b589010 fffffa80`0adc1ab0 fffffa80`0b120410 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`08bd1540 fffff880`1019af13 : fffffa80`0b589010 00000000`00000000 fffffa80`0adc1ab0 fffffa80`0b120410 : dxgkrnl!TdrIsRecoveryRequired+0x21f
fffff880`08bd1570 fffff880`101c8ed6 : fffffa80`ffffffff 00000000`0000f2d9 fffff880`08bd16c0 00000000`00000006 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`08bd1650 fffff880`101aece9 : fffffa80`0b200000 ffffffff`feced300 00000000`00000006 fffffa80`0b200000 : dxgmms1!VidSchWaitForCompletionEvent+0x196
fffff880`08bd1690 fffff880`101ac184 : 00000000`00002ebb fffff8a0`04ddce50 fffffa80`0b200000 00000000`00000001 : dxgmms1!VIDMM_GLOBAL: xWaitForAllEngines+0x1e9
fffff880`08bd1790 fffff880`101a99d3 : 00000000`00000000 fffffa80`0bb1b0b0 00000000`0000001c fffffa80`0c243218 : dxgmms1!VIDMM_GLOBAL: ReferenceAllocationForSubmission+0xfc
fffff880`08bd17d0 fffff880`101c37d9 : 00000000`00000000 fffff8a0`0faf86f0 fffffa80`00000001 fffffa80`07dcef10 : dxgmms1!VIDMM_GLOBAL: PrepareDmaBuffer+0xe1b
fffff880`08bd19a0 fffff880`101c3514 : fffff880`033dbf40 fffff880`101c2f00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`08bd1b90 fffff880`101c3012 : 00000000`00000000 fffffa80`0b971010 00000000`00000080 fffffa80`0b120410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`08bd1bc0 fffff800`039692ea : 00000000`fffffc32 fffffa80`0adc5b50 fffffa80`06987b30 fffffa80`0adc5b50 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`08bd1c00 fffff800`036bd8e6 : fffff880`033d7180 fffffa80`0adc5b50 fffff880`033e1fc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`08bd1c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nvlddmkm+153bbc
fffff880`0f5a1bbc 803d86de730000 cmp byte ptr [nvlddmkm+0x891a49 (fffff880`0fcdfa49)],0
SYMBOL_NAME: nvlddmkm+153bbc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52b326bc
FAILURE_BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys
BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys
Followup: MachineOwner
---------
CPUID: "Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz"
MaxSpeed: 3400
CurrentSpeed: 3392
[SMBIOS Data Tables v2.7]
[DMI Version - 39]
[2.0 Calling Convention - No]
[Table Size - 3083 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version F2
BIOS Starting Address Segment f000
BIOS Release Date 08/05/2013
BIOS ROM Size 800000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
11: - Specification Reserved
BIOS Major Revision 4
BIOS Minor Revision 6
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer Gigabyte Technology Co., Ltd.
Product Name H81-D3
Version To be filled by O.E.M.
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To be filled by O.E.M.
Family To be filled by O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer Gigabyte Technology Co., Ltd.
Product H81-D3
Version x.x
Serial Number
Asset Tag
Feature Flags 09h
255016308: - eA3
255016268: - eA3
Location To be filled by O.E.M.
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 22 - Handle 0003h]
Manufacturer Gigabyte Technology Co., Ltd.
Chassis Type Desktop
Version To Be Filled By O.E.M.
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Cache Information (Type 7) - Length 19 - Handle 0004h]
Socket Designation CPU Internal L1
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0080h - 128K
Installed Size 0080h - 128K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Other
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation CPU Internal L2
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 0200h - 512K
Installed Size 0200h - 512K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation CPU Internal L3
Cache Configuration 0182h - WB Enabled Int NonSocketed L3
Maximum Cache Size 0c00h - 3072K
Installed Size 0c00h - 3072K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity Specification Reserved
[Physical Memory Array (Type 16) - Length 23 - Handle 0007h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 33554432KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 2
[Onboard Devices Information (Type 10) - Length 6 - Handle 0026h]
Number of Devices 1
01: Type Video [enabled]
01: Description To Be Filled By O.E.M.
[OEM Strings (Type 11) - Length 5 - Handle 0027h]
Number of Strings 5
1 To Be Filled By O.E.M.
2 To Be Filled By O.E.M.
3 To Be Filled By O.E.M.
4 To Be Filled By O.E.M.
5 To Be Filled By O.E.M.
[System Configuration Options (Type 12) - Length 5 - Handle 0028h]
[Processor Information (Type 4) - Length 42 - Handle 0040h]
Socket Designation SOCKET 0
Processor Type Central Processor
Processor Family c6h - Specification Reserved
Processor Manufacturer Intel
Processor ID c3060300fffbebbf
Processor Version Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz
Processor Voltage 8bh - 1.1V
External Clock 100MHz
Max Speed 7000MHz
Current Speed 3400MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0004h
L2 Cache Handle 0005h
L3 Cache Handle 0006h
Serial Number [String Not Specified]
Asset Tag Number
Part Number Fill By OEM
[Memory Device (Type 17) - Length 34 - Handle 0041h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelA-DIMM0
Bank Locator BANK 0
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1333MHz
Manufacturer Kingston
Serial Number
Asset Tag Number
Part Number KHX1600C10D3/8GX
[Memory Device Mapped Address (Type 20) - Length 35 - Handle 0042h]
Starting Address 00000000h
Ending Address 007fffffh
Memory Device Handle 0041h
Mem Array Mapped Adr Handle 0046h
Partition Row Position [Unknown]
Interleave Position [Unknown]
Interleave Data Depth [Unknown]
[Memory Device (Type 17) - Length 34 - Handle 0043h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelA-DIMM1
Bank Locator BANK 1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0044h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelB-DIMM0
Bank Locator BANK 2
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Device (Type 17) - Length 34 - Handle 0045h]
Physical Memory Array Handle 0007h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelB-DIMM1
Bank Locator BANK 3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [Empty]
Serial Number
Asset Tag Number
Part Number [Empty]
[Memory Array Mapped Address (Type 19) - Length 31 - Handle 0046h]
Starting Address 00000000h
Ending Address 007fffffh
Memory Array Handle 0007h
Partition Width 04
start end module name
fffff880`00e00000 fffff880`00e57000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`030aa000 fffff880`03133000 afd afd.sys Sat Sep 28 03: 09: 07 2013 (52462C33)
fffff880`0778c000 fffff880`077a2000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`0158e000 fffff880`01599000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`01d96000 fffff880`01d9e000 AppleCharger AppleCharger.sys Tue Feb 19 05: 17: 09 2013 (5122FCC5)
fffff880`0c985000 fffff880`0c990000 asyncmac asyncmac.sys Tue Jul 14 02: 10: 13 2009 (4A5BCCE5)
fffff880`010d8000 fffff880`010e1000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`010e1000 fffff880`0110b000 ataport ataport.SYS Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff880`04786000 fffff880`0478d000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`031ee000 fffff880`031ff000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`074da000 fffff880`074f8000 bowser bowser.sys Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff960`00610000 fffff960`00637000 cdd cdd.dll unavailable (00000000)
fffff880`0b3db000 fffff880`0b3f8000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`04753000 fffff880`0477d000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`01c40000 fffff880`01c70000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00d4f000 fffff880`00dad000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01184000 fffff880`011f6000 cng cng.sys Wed Aug 01 17: 48: 07 2012 (50194FB7)
fffff880`0777c000 fffff880`0778c000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`09238000 fffff880`09246000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`0308b000 fffff880`030a9000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`0307c000 fffff880`0308b000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`0103a000 fffff880`01050000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`07800000 fffff880`07822000 drmk drmk.sys Fri Oct 04 04: 16: 30 2013 (524E24FE)
fffff880`0470b000 fffff880`04753000 dtsoftbus01 dtsoftbus01.sys Thu Jun 20 09: 22: 51 2013 (51C2ADCB)
fffff880`09246000 fffff880`09250000 dump_diskdump dump_diskdump.sys Fri Apr 22 22: 04: 32 2011 (4DB1DF50)
fffff880`09250000 fffff880`09263000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`04426000 fffff880`046f7000 dump_iaStorA dump_iaStorA.sys Mon Apr 22 21: 38: 05 2013 (5175919D)
fffff880`09263000 fffff880`0926f000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`10097000 fffff880`1018b000 dxgkrnl dxgkrnl.sys Thu Aug 01 09: 58: 53 2013 (51FA153D)
fffff880`1018b000 fffff880`101d1000 dxgmms1 dxgmms1.sys Wed Apr 10 05: 27: 15 2013 (5164DC13)
fffff880`01c88000 fffff880`01d56000 eamonm eamonm.sys Thu Aug 15 16: 53: 50 2013 (520CEB7E)
fffff880`0478d000 fffff880`047ba000 ehdrv ehdrv.sys Thu Aug 15 16: 54: 11 2013 (520CEB93)
fffffa80`09ded000 fffffa80`09e34000 em006_64 em006_64.dat Mon Nov 25 16: 40: 14 2013 (52936F5E)
fffffa80`09e5e000 fffffa80`09ec2000 em018_64 em018_64.dat Thu Feb 06 10: 11: 02 2014 (52F351A6)
fffff880`075af000 fffff880`075d9000 epfwwfpr epfwwfpr.sys Thu Aug 15 16: 55: 17 2013 (520CEBD5)
fffff880`015e5000 fffff880`015f9000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`01599000 fffff880`015e5000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`017e4000 fffff880`017ee000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`00dad000 fffff880`00de7000 fvevol fvevol.sys Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`0188b000 fffff880`018d4000 fwpkclnt fwpkclnt.sys Thu Jan 03 04: 06: 48 2013 (50E4F5C8)
fffff800`0360e000 fffff800`03657000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`077ec000 fffff880`077f7000 hamachi hamachi.sys Thu Feb 19 11: 36: 41 2009 (499D3639)
fffff880`101d1000 fffff880`101f5000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`07d37000 fffff880`07d4a000 HECIx64 HECIx64.sys Mon Dec 17 20: 32: 21 2012 (50CF7345)
fffff880`095c8000 fffff880`095e1000 HIDCLASS HIDCLASS.SYS Wed Jul 03 06: 05: 05 2013 (51D3A2F1)
fffff880`095e1000 fffff880`095e9080 HIDPARSE HIDPARSE.SYS Wed Jul 03 06: 05: 04 2013 (51D3A2F0)
fffff880`095ba000 fffff880`095c8000 hidusb hidusb.sys Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`07411000 fffff880`074da000 HTTP HTTP.sys Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`01600000 fffff880`01609000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`0125a000 fffff880`0152b000 iaStorA iaStorA.sys Mon Apr 22 21: 38: 05 2013 (5175919D)
fffff880`017ee000 fffff880`017f9000 iaStorF iaStorF.sys Mon Apr 22 21: 38: 07 2013 (5175919F)
fffff880`081d7000 fffff880`08200000 idmwfp idmwfp.sys Mon Apr 23 15: 14: 15 2012 (4F9555A7)
fffff880`07837000 fffff880`07c71720 igdkmd64 igdkmd64.sys Fri May 17 22: 15: 07 2013 (51968FCB)
fffff880`080ca000 fffff880`0813d000 IntcDAud IntcDAud.sys Fri Jan 11 14: 55: 16 2013 (50F019C4)
fffff880`07766000 fffff880`0777c000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`00eaa000 fffff880`00eb4000 iusb3hcs iusb3hcs.sys Fri Mar 29 13: 37: 59 2013 (51558B27)
fffff880`0813d000 fffff880`0819c000 iusb3hub iusb3hub.sys Fri Mar 29 13: 36: 15 2013 (51558ABF)
fffff880`07c72000 fffff880`07d35000 iusb3xhc iusb3xhc.sys Fri Mar 29 13: 36: 19 2013 (51558AC3)
fffff880`07db2000 fffff880`07dc1000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`0922a000 fffff880`09238000 kbdhid kbdhid.sys Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff800`00bc2000 fffff800`00bcc000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff880`0f400000 fffff880`0f443000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`017b8000 fffff880`017d3000 ksecdd ksecdd.sys Wed Sep 25 03: 03: 28 2013 (52423660)
fffff880`01860000 fffff880`0188b000 ksecpkg ksecpkg.sys Wed Sep 25 03: 20: 07 2013 (52423A47)
fffff880`07678000 fffff880`0767d200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`095ea000 fffff880`095ff000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0819c000 fffff880`081bf000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`00cec000 fffff880`00d3b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`0926f000 fffff880`0927d000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`07dc1000 fffff880`07dd0000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`0921d000 fffff880`0922a000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`010be000 fffff880`010d8000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`074f8000 fffff880`07510000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`07510000 fffff880`0753d000 mrxsmb mrxsmb.sys Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`0753d000 fffff880`0758b000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`0758b000 fffff880`075af000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`0110b000 fffff880`01116000 msahci msahci.sys Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`0441b000 fffff880`04426000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00e60000 fffff880`00e6a000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`01126000 fffff880`01184000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`03071000 fffff880`0307c000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`019e9000 fffff880`019fb000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`018d8000 fffff880`019ca000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`077c6000 fffff880`077d2000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`07600000 fffff880`0762f000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`08081000 fffff880`08096000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`031a7000 fffff880`031b6000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`03133000 fffff880`03178000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`01800000 fffff880`01860000 NETIO NETIO.SYS Tue Nov 26 11: 21: 01 2013 (5294760D)
fffff880`01d56000 fffff880`01d67000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`03065000 fffff880`03071000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff800`03657000 fffff800`03c3c000 nt ntkrnlmp.exe Thu Aug 29 03: 13: 25 2013 (521EA035)
fffff880`01616000 fffff880`017b8000 Ntfs Ntfs.sys Fri Apr 12 13: 54: 36 2013 (5167F5FC)
fffff880`0477d000 fffff880`04786000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`08096000 fffff880`080ca000 nvhda64v nvhda64v.sys Thu Nov 28 14: 38: 09 2013 (52974741)
fffff880`0f44e000 fffff880`10097000 nvlddmkm nvlddmkm.sys Thu Dec 19 18: 02: 52 2013 (52B326BC)
fffff880`07de4000 fffff880`07df1000 nvvad64v nvvad64v.sys Thu Dec 05 00: 10: 01 2013 (529FB649)
fffff880`03181000 fffff880`031a7000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`07749000 fffff880`07766000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`00eb4000 fffff880`00ec9000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00e6a000 fffff880`00e9d000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`01116000 fffff880`01126000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`017d3000 fffff880`017e4000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`019d2000 fffff880`019e9000 pe3arjjb pe3arjjb.sys Wed Apr 16 11: 01: 37 2008 (4805C071)
fffff880`0b27e000 fffff880`0b324000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`01c00000 fffff880`01c3d000 portcls portcls.sys Fri Oct 04 03: 36: 02 2013 (524E1B82)
fffff880`00ec9000 fffff880`00ee7000 ps7arjjb ps7arjjb.sys Wed Apr 16 11: 00: 56 2008 (4805C048)
fffff880`00d3b000 fffff880`00d4f000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`077a2000 fffff880`077c6000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`0762f000 fffff880`0764a000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0764a000 fffff880`0766b000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`077d2000 fffff880`077ec000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`03014000 fffff880`03065000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`04400000 fffff880`04409000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04409000 fffff880`04412000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`04412000 fffff880`0441b000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`081bf000 fffff880`081d7000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0767f000 fffff880`0773d000 Rt64win7 Rt64win7.sys Thu Oct 25 11: 20: 09 2012 (50890449)
fffff880`0928d000 fffff880`095b9180 RTKVHD64 RTKVHD64.sys Tue Feb 26 13: 38: 48 2013 (512CACD8)
fffff880`0b324000 fffff880`0b32f000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`0773d000 fffff880`07749000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`031b6000 fffff880`031d3000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`077f7000 fffff880`077ff000 serscan serscan.sys Tue Jul 14 02: 35: 32 2009 (4A5BD2D4)
fffff880`019ca000 fffff880`019d2000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`0c87c000 fffff880`0c914000 srv srv.sys Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`0b372000 fffff880`0b3db000 srv2 srv2.sys Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`0b32f000 fffff880`0b360000 srvnet srvnet.sys Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`0152b000 fffff880`0158e000 storport storport.sys Fri Mar 11 05: 30: 23 2011 (4D79A55F)
fffff880`07dd0000 fffff880`07dd1480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`0766b000 fffff880`07678000 tap0901 tap0901.sys Wed Nov 19 19: 22: 35 2008 (4924596B)
fffff880`01a00000 fffff880`01bff000 tcpip tcpip.sys Sun Sep 08 03: 11: 52 2013 (522BCED8)
fffff880`0b360000 fffff880`0b372000 tcpipreg tcpipreg.sys Wed Oct 03 18: 07: 26 2012 (506C62BE)
fffff880`01d89000 fffff880`01d96000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`01d67000 fffff880`01d89000 tdx tdx.sys Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`03000000 fffff880`03014000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`01d9e000 fffff880`01dc4000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`07dd2000 fffff880`07de4000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`09200000 fffff880`0921d000 usbccgp usbccgp.sys Wed Nov 27 02: 41: 15 2013 (52954DBB)
fffff880`07d35000 fffff880`07d36e80 USBD USBD.SYS Wed Nov 27 02: 41: 03 2013 (52954DAF)
fffff880`07d4a000 fffff880`07d5c000 usbehci usbehci.sys Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`08027000 fffff880`08081000 usbhub usbhub.sys Wed Nov 27 02: 41: 36 2013 (52954DD0)
fffff880`07d5c000 fffff880`07db2000 USBPORT USBPORT.SYS Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`00e9d000 fffff880`00eaa000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`047ba000 fffff880`047c8000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`047c8000 fffff880`047ed000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`00fc7000 fffff880`00fdc000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`01062000 fffff880`010be000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`01200000 fffff880`0124c000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`031d3000 fffff880`031ee000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`047ed000 fffff880`047fd000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`00ef5000 fffff880`00fb7000 Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00fb7000 fffff880`00fc7000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`03178000 fffff880`03181000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff960`00020000 fffff960`00337000 win32k win32k.sys unavailable (00000000)
fffff880`00e57000 fffff880`00e60000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
Unloaded modules:
fffff880`0c914000 fffff880`0c985000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01c70000 fffff880`01c7e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01c7e000 fffff880`01c88000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`04427000 fffff880`046f8000 dump_iaStorA
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 002D1000
fffff880`046f8000 fffff880`0470b000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
fffff880`031ee000 fffff880`031f6000 UsbCharger.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00008000
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c: \Users\user\SysnativeBSODApps\031014-22152-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03606000 PsLoadedModuleList = 0xfffff800`038496d0
Debug session time: Mon Mar 10 16: 50: 23.982 2014 (UTC + 2: 00)
System Uptime: 0 days 0: 13: 06.997
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa8007a6c028, be000000, 1001152}
Probably caused by : hardware
Followup: MachineOwner
---------
1: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8007a6c028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000be000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000001001152, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: f
STACK_TEXT:
fffff880`009f6a58 fffff800`03bfda3b : 00000000`00000124 00000000`00000000 fffffa80`07a6c028 00000000`be000000 : nt!KeBugCheckEx
fffff880`009f6a60 fffff800`03792463 : 00000000`00000001 fffffa80`07705c90 00000000`00000000 fffffa80`07705ce0 : hal!HalBugCheckSystem+0x1e3
fffff880`009f6aa0 fffff800`03bfd700 : 00000000`00000728 fffffa80`07705c90 fffff880`009f6e30 fffff880`009f6e00 : nt!WheaReportHwError+0x263
fffff880`009f6b00 fffff800`03bfd052 : fffffa80`07705c90 fffff880`009f6e30 fffffa80`07705c90 00000000`00000000 : hal!HalpMcaReportError+0x4c
fffff880`009f6c50 fffff800`03bfcf0d : 00000000`00000004 00000000`00000001 fffff880`009f6eb0 00000000`00000000 : hal!HalpMceHandler+0x9e
fffff880`009f6c90 fffff800`03bf0e88 : 00000000`00000001 fffff880`009ee180 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x55
fffff880`009f6cc0 fffff800`0367a4ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`009f6cf0 fffff800`0367a313 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`009f6e30 fffff880`0795cc61 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x153
fffff880`0331bb58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : intelppm!MWaitIdle+0x19
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_CACHE
BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_CACHE
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`0365e000 PsLoadedModuleList = 0xfffff800`038a16d0
Debug session time: Fri Mar 21 15: 06: 03.274 2014 (UTC + 2: 00)
System Uptime: 0 days 0: 15: 25.663
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff8800e025090, 0, 0}
Probably caused by : afd.sys ( afd!AfdReceiveDatagramEventCommonHandler+399 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800e025090, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
+4502faf0011d990
fffff880`0e025090 b85f020e80 mov eax,800E025Fh
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000390b100
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff8800e025fb8 -- (.exr 0xfffff8800e025fb8)
.exr 0xfffff8800e025fb8
ExceptionAddress: fffff800036d746c (nt!IopfCompleteRequest+0x00000000000001dc)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff8800e026060 -- (.trap 0xfffff8800e026060)
.trap 0xfffff8800e026060
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffa800bb5f460ff rbx=0000000000000000 rcx=fffffa800cd087d0
rdx=fffff8800e026270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036d746c rsp=fffff8800e0261f0 rbp=00000000a000000c
r8=0000058000000000 r9=0000000000000000 r10=fffffa800cc76730
r11=000000000000008b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!IopfCompleteRequest+0x1dc:
fffff800`036d746c 488b18 mov rbx,qword ptr [rax] ds: 0001: fffa800b`b5f460ff=?
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800037651bb to fffff800036d3bc0
STACK_TEXT:
fffff880`0e024fd8 fffff800`037651bb : 00000000`0000001e ffffffff`c0000005 fffff880`0e025090 00000000`00000000 : nt!KeBugCheckEx
fffff880`0e024fe0 fffff800`03726d18 : 0000174c`000007a0 0458f068`0458f038 0000174c`776fe971 000007a0`00001eec : nt!KipFatalFilter+0x1b
fffff880`0e025020 fffff800`036fecdc : 00000000`00060ae8 776fe9f6`0458f098 c0150008`0005174c 0458f100`00000000 : nt! ? : FNODOBFM: `string'+0x83d
fffff880`0e025060 fffff800`036fe75d : fffff800`0381fd74 fffff880`0e026930 00000000`00000000 fffff800`0365e000 : nt!_C_specific_handler+0x8c
fffff880`0e0250d0 fffff800`036fd535 : fffff800`0381fd74 fffff880`0e025148 fffff880`0e025fb8 fffff800`0365e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0e025100 fffff800`0370e4c1 : fffff880`0e025fb8 fffff880`0e025810 fffff880`00000000 fffffa80`00000005 : nt!RtlDispatchException+0x415
fffff880`0e0257e0 fffff800`036d3242 : fffff880`0e025fb8 fffffa80`0ce9ec0f fffff880`0e026060 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`0e025e80 fffff800`036d1b4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0e026060 fffff800`036d746c : 00000000`a000000c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`0e0261f0 fffff880`03091889 : 00000000`00000000 00000000`00000002 fffffa80`000004c0 00000000`00000000 : nt!IopfCompleteRequest+0x1dc
fffff880`0e0262e0 fffff880`030d5699 : 00000000`00000000 00000000`00000001 fffffa80`0a1c6080 00000000`00000000 : afd!AfdReceiveDatagramEventCommonHandler+0x399
fffff880`0e026380 fffff880`01a84ca5 : fffffa80`000004c0 fffffa80`075fb820 00000000`00000000 fffff880`0e026480 : afd!AfdTLDgramReceiveEventHandler+0xe9
fffff880`0e026410 fffff880`01a7f21b : 00000000`00000028 fffffa80`0c680230 fffffa80`00000000 fffff880`0e026650 : tcpip!UdpDeliverDatagrams+0x155
fffff880`0e0265a0 fffff880`01a5af77 : 00000000`00000000 00000000`00000000 c303c804`d40dd40d fffffa80`0c0ef0c0 : tcpip!UdpReceiveDatagrams+0x21b
fffff880`0e026640 fffff880`01a5aa8a : 00000000`00000000 fffff880`01b68800 fffff880`0e026800 fffff880`01a4bcb5 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0e026700 fffff880`01a5a089 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0e0267f0 : tcpip!IppProcessDeliverList+0x5a
fffff880`0e0267a0 fffff880`01a3d26f : fffffa80`0b8296c0 fffff800`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0e026880 fffff800`036df878 : fffff880`01b68800 00000000`00000d11 00000000`00000004 fffffa80`0a16bca0 : tcpip!IppLoopbackTransmit+0x38f
fffff880`0e026930 fffff880`01a3d90f : fffff880`01a906cc fffffa80`0a16bc90 fffff880`0e026b02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0e026a10 fffff880`01a5c4aa : fffffa80`0b8296c0 00000000`00000000 fffffa80`0a16bc00 fffffa80`0cdc37a0 : tcpip!IppLoopbackEnqueue+0x22f
fffff880`0e026ac0 fffff880`01a5dbd5 : 00000000`00000000 fffffa80`0da78100 fffffa80`00000000 00000000`000004a4 : tcpip!IppDispatchSendPacketHelper+0x38a
fffff880`0e026b80 fffff880`01a5ce5e : fffffa80`075ecc11 fffff880`0e027000 00000000`00000028 fffffa80`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff880`0e026ca0 fffff880`01a5f77e : 00000000`00000000 fffff880`01802f04 fffff8a0`00000001 fffffa80`0cdc37a0 : tcpip!IppSendDatagramsCommon+0x87e
fffff880`0e026e40 fffff880`01a3bef1 : fffff880`0e0277d0 fffffa80`0b7eab80 fffffa80`0b7eab80 fffffa80`0c680230 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`0e026e80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!UdpSendMessagesOnPathCreation+0x6d1
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdReceiveDatagramEventCommonHandler+399
fffff880`03091889 e926fdffff jmp afd!AfdReceiveDatagramEventCommonHandler+0xc4 (fffff880`030915b4)
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: afd!AfdReceiveDatagramEventCommonHandler+399
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52462c33
FAILURE_BUCKET_ID: X64_0x1E_c0000005_afd!AfdReceiveDatagramEventCommonHandler+399
BUCKET_ID: X64_0x1E_c0000005_afd!AfdReceiveDatagramEventCommonHandler+399
Followup: MachineOwner
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`0361e000 PsLoadedModuleList = 0xfffff800`038616d0
Debug session time: Sun Apr 13 09: 42: 55.992 2014 (UTC + 2: 00)
System Uptime: 0 days 0: 01: 18.381
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {9a, 150c9e, 0, 0}
Unable to load image \?\C: \Windows\system32\drivers\MiniIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for MiniIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for MiniIcpt.sys
Probably caused by : memory_corruption ( nt!MiBadRefCount+4f )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 0000000000150c9e
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_9a
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800037229ef to fffff80003693bc0
STACK_TEXT:
fffff880`0274be48 fffff800`037229ef : 00000000`0000004e 00000000`0000009a 00000000`00150c9e 00000000`00000000 : nt!KeBugCheckEx
fffff880`0274be50 fffff800`03706d49 : 00000000`00000002 fffffa80`03f3e9a0 00000000`001514de 00000000`00000002 : nt!MiBadRefCount+0x4f
fffff880`0274be90 fffff800`03681fb3 : fffffa80`0c9779a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ? : FNODOBFM: `string'+0x372b4
fffff880`0274bf70 fffff800`0397d100 : 00000000`00000000 00000000`00000000 fffffa80`0be0b240 fffffa80`06aff000 : nt!CcFetchDataForRead+0x1c3
fffff880`0274bfd0 fffff880`0161f4f0 : fffff8a0`00000000 00000000`00000001 fffffa80`00040000 fffff880`01673001 : nt!CcCopyRead+0x180
fffff880`0274c090 fffff880`01620fd3 : fffffa80`0cb308b0 fffff8a0`044ef103 fffff880`0274c290 fffff8a0`03fb7c08 : Ntfs!NtfsCachedRead+0x180
fffff880`0274c0f0 fffff880`01621398 : fffffa80`0b5b6410 fffffa80`0cb308b0 fffff880`0274c201 fffffa80`0c506c00 : Ntfs!NtfsCommonRead+0x19ea
fffff880`0274c260 fffff880`0129abcf : fffffa80`0cb30c50 fffffa80`0cb308b0 fffffa80`0c506c30 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`0274c310 fffff880`0129daea : 00000000`00000000 00000000`00000000 fffffa80`076dac00 fffffa80`0c506c30 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0274c3a0 fffff880`012aa274 : fffffa80`0b4fa020 00000000`00000019 fffffa80`07835010 00000000`00000000 : fltmgr!FltPerformSynchronousIo+0x2ca
fffff880`0274c440 fffff880`04433d63 : fffffa80`09ede810 fffff880`0274d000 00000000`00130a00 fffffa80`0c9b7c30 : fltmgr!FltReadFile+0x334
fffff880`0274c520 fffffa80`09ede810 : fffff880`0274d000 00000000`00130a00 fffffa80`0c9b7c30 fffffa80`06aff000 : MiniIcpt+0x9d63
fffff880`0274c528 fffff880`0274d000 : 00000000`00130a00 fffffa80`0c9b7c30 fffffa80`06aff000 00000000`00000004 : 0xfffffa80`09ede810
fffff880`0274c530 00000000`00130a00 : fffffa80`0c9b7c30 fffffa80`06aff000 00000000`00000004 fffff880`0274c5c0 : 0xfffff880`0274d000
fffff880`0274c538 fffffa80`0c9b7c30 : fffffa80`06aff000 00000000`00000004 fffff880`0274c5c0 00000000`00000000 : 0x130a00
fffff880`0274c540 fffffa80`06aff000 : 00000000`00000004 fffff880`0274c5c0 00000000`00000000 00000000`00000000 : 0xfffffa80`0c9b7c30
fffff880`0274c548 00000000`00000004 : fffff880`0274c5c0 00000000`00000000 00000000`00000000 fffff880`0274c728 : 0xfffffa80`06aff000
fffff880`0274c550 fffff880`0274c5c0 : 00000000`00000000 00000000`00000000 fffff880`0274c728 00000000`00000000 : 0x4
fffff880`0274c558 00000000`00000000 : 00000000`00000000 fffff880`0274c728 00000000`00000000 00000000`00000000 : 0xfffff880`0274c5c0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadRefCount+4f
fffff800`037229ef cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadRefCount+4f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_9a_nt!MiBadRefCount+4f
BUCKET_ID: X64_0x4E_9a_nt!MiBadRefCount+4f
Followup: MachineOwner
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03616000 PsLoadedModuleList = 0xfffff800`038596d0
Debug session time: Tue Apr 15 19: 15: 02.334 2014 (UTC + 2: 00)
System Uptime: 0 days 0: 03: 14.723
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960000c5f96, fffff8800a8d4f00, 0}
Probably caused by : win32k.sys ( win32k!GdiThreadCallout+3a )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000c5f96, Address of the instruction which caused the bugcheck
Arg3: fffff8800a8d4f00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
win32k!GdiThreadCallout+3a
fffff960`000c5f96 488b4818 mov rcx,qword ptr [rax+18h]
CONTEXT: fffff8800a8d4f00 -- (.cxr 0xfffff8800a8d4f00)
.cxr 0xfffff8800a8d4f00
rax=00000000ffffffff rbx=fffffa800c138580 rcx=fffffa800c138580
rdx=0000000000000001 rsi=fffffa800c138580 rdi=0000000000000001
rip=fffff960000c5f96 rsp=fffff8800a8d58e0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff8800a8d58d8 r12=fffffa800ca61060 r13=fffffa800b393090
r14=0000000000000001 r15=fffffa800ca611c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
win32k!GdiThreadCallout+0x3a:
fffff960`000c5f96 488b4818 mov rcx,qword ptr [rax+18h] ds: 002b: 00000001`00000017=?
.cxr
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: IDMan.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff960000c5f96
STACK_TEXT:
fffff880`0a8d58e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!GdiThreadCallout+0x3a
FOLLOWUP_IP:
win32k!GdiThreadCallout+3a
fffff960`000c5f96 488b4818 mov rcx,qword ptr [rax+18h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!GdiThreadCallout+3a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 52f4357b
STACK_COMMAND: .cxr 0xfffff8800a8d4f00 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!GdiThreadCallout+3a
BUCKET_ID: X64_0x3B_win32k!GdiThreadCallout+3a
Followup: MachineOwner
![[Obrazek: 2089620800_1406976151.png]](http://obrazki.elektroda.pl/2089620800_1406976151.png)
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 03.05.2014 22:08 przez thermalfake.)
03.05.2014 22:06
|