BSOD: częste błędy w laptopie Lenovo B570 - Adikmo - 29.09.2012 15:40
Witam, mam problem z laptopem Lenovo B570. Mianowicie często pojawia się BlueScreen i komputer restartuje się, pojawiąją się różne kody, teraz akurat pojawił się taki:
Podpis problemu:
Nazwa zdarzenia problemu: BlueScreen
Wersja systemu operacyjnego: 6.1.7600.2.0.0.256.48
Identyfikator ustawień regionalnych: 1045
Dodatkowe informacje o problemie:
BCCode: 50
BCP1: FFFFF88004AD27D0
BCP2: 0000000000000000
BCP3: FFFFF96000302D80
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Pliki pomagające opisać problem:
C:\Windows\Minidump\092912-20545-01.dmp
C:\Users\Adrian\AppData\Local\Temp\WER-50700-0.sysdata.xml
Przeczytaj w trybie online nasze zasady zachowania poufności informacji:
http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0415
Jeśli zasady zachowania poufności informacji w trybie online nie są dostępne, przeczytaj nasze zasady zachowania poufności informacji w trybie offline:
C:\Windows\system32\pl-PL\erofflps.txt
System był wgrywany już kilkanaście razy od nowa, próbował różne werse Wind 7 i nic, zainstalował nawet Viste i było dobrze 3 dni. Komputer był na gwarancji ale nie wykryto uszkodzenia.
Konfiguracja:
Intel Core i3
Ram 8 GB
Grafika Intel HD 3000
Dodaje pliki mimidump i system:
http://www29.zippyshare.com/v/39038653/file.html
RE: BlueScreen - thermalfake - 29.09.2012 19:58
Pytanie nr 1 - czy jest legalny system a jeśli jest to dlaczego przeskakujesz między różnymi wersjami licencji skoro ich prawdopodobnie nie posiadasz.
W zasadzie plik dziennika zdarzeń w miarę OK. Poważniejsze błędy przy aktualizacji poprawek:
Instalacja nie powiodła się: system Windows nie mógł zainstalować następującej aktualizacji, ponieważ wystąpił błąd 0x80070643: Zbiorcza aktualizacja zabezpieczeń programu Internet Explorer 8 dla systemu Windows 7 x64 (KB2744842).
http://support.microsoft.com/kb/976982
Moim zdaniem wszystkie bsody sprowadzają się do wadliwych kości RAM/problemów z portami pamięci na płycie choć memtest86 nie zawsze jest wiarygodny.
To co co bym zrobił
- postawił system z recovery lub zainstalował tą na którą masz licencję;
- jeśli goły system to doinstalować aktualne sterowniki ze tylko ze strony producenta;
- jeśli fabryczny system to odchudzanie nadmiaru bloatware programem PC Decrapifier;
- zainstalować wszelkie poprawki razem z SP1 (widziałem system był bez);
- zainstalować Program AV/IS;
- zrobić kopię zapasową systemu na drugą partycję żeby po tysiąc razy nie przeinstalowywać w razie czego;
- zainstalować jakąś jedną grę i zacząć korzystać normalnie z systemu czyli internet filmy, muzyka i obserwować;
- dla pewności przeprowadzić inspekcję sterowników
Cytat:Dla pewności uruchom managera weryfikacji sterowników - Driver Verifier żeby sprawdzić (testuje je) czy system będzie działał stabilnie bez bsodów.
- Kliknij Start, wpisz cmd a potem verifier.exe
- Zaznacz opcję "Utwórz ustawienia niestandardowe".
- Kliknij "Wybierz indywidualne ustawienia z pełnej listy".
- Zaznacz opcje -> Pula specjalna - Śledzenie puli - Wymuszanie sprawdzenia IRQL.
- Kliknij "Wybierz nazwy sterowników z listy" po czym chwilę czekamy.
- Zaznaczamy wszystkie sterowniki nie pochodzące od Microsoft (sortujemy wg kolumny Dostawca).
- Klikamy zakończ, uruchamiamy ponownie komputer i czekamy pracując sobie na złe lub dobre wieści czy system się wysypie bsodem czy nie, sugeruję dobre kilka godzin.
- Wpisujemy verifier.exe /reset aby zakończyć diagnostykę sterowników i uruchamiamy sprzęt ponownie.
Tylko ten bsod wskazuje na wadliwy sterownik tcpip.sys
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-44397-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Sat Sep 29 16: 08: 43.516 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 00: 30.530
Loading Kernel Symbols
...............................................................
................................................................
.......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffea80093ce410, 2, 0, fffff80002a3e567}
Probably caused by : tcpip.sys ( tcpip!IppRestructureHashTableUnderLock+69 )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffea80093ce410, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a3e567, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc70e0
ffffea80093ce410
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlExpandHashTable+e7
fffff800`02a3e567 498b5310 mov rdx,qword ptr [r11+10h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c060 -- (.trap 0xfffff80000b9c060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001fff rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000001abf rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a3e567 rsp=fffff80000b9c1f0 rbp=fffffa8009378000
r8=fffffa800940e400 r9=fffffa80093ce400 r10=fffffa80093ce400
r11=ffffea80093ce400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!RtlExpandHashTable+0xe7:
fffff800`02a3e567 498b5310 mov rdx,qword ptr [r11+10h] ds: 0001: ffffea80`093ce410=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a90469 to fffff80002a90f00
STACK_TEXT:
fffff800`00b9bf18 fffff800`02a90469 : 00000000`0000000a ffffea80`093ce410 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9bf20 fffff800`02a8f0e0 : fffff800`00b9c128 fffff880`01787800 fffffa80`07777340 00000000`00000801 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c060 fffff800`02a3e567 : fffffa80`07deb010 fffff880`01787800 00000000`00020000 fffff880`00000000 : nt!KiPageFault+0x260
fffff800`00b9c1f0 fffff880`016567c9 : fffff880`01787800 fffffa80`07bfbca0 00000000`00000000 00000000`00000000 : nt!RtlExpandHashTable+0xe7
fffff800`00b9c220 fffff880`0166c206 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016572a0 : tcpip!IppRestructureHashTableUnderLock+0x69
fffff800`00b9c250 fffff880`0166c559 : fffffa80`07bb6f00 00000000`00000000 fffff800`00b9c340 fffff800`00b9c390 : tcpip!IppFlushNeighborSet+0x96
fffff800`00b9c2c0 fffff880`01656da7 : fffff880`0176b9a0 fffffa80`07bb6f00 fffffa80`07bfbd30 fffffa80`07c1bb58 : tcpip!IppNeighborSetTimeout+0x23f
fffff800`00b9c410 fffff880`01657488 : fffffa80`07c1bb58 00000000`00000000 00000000`ffffff00 fffff800`00b9c5c0 : tcpip!Ipv4pInterfaceSetTimeout+0x1dc
fffff800`00b9c490 fffff880`0165630a : 00000000`00000000 fffff800`00b9c5c0 00000000`00000001 fffff800`02a9aa9a : tcpip!IppCompartmentSetTimeout+0x88
fffff800`00b9c500 fffff800`02a9cfa6 : 00000000`00000000 00000001`00000000 01535242`40c40089 00000008`00000002 : tcpip!IppTimeout+0x5a
fffff800`00b9c530 fffff800`02a9c326 : fffff880`01787880 00000000`000007a5 00000000`00000000 fffffa80`07deac60 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5a0 fffff800`02a9ce7e : 00000000`1232a367 fffff800`00b9cc18 00000000`000007a5 fffff800`02c0d728 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cbf0 fffff800`02a9c697 : 00000000`03f4c9c1 00000000`000007a5 00000000`03f4c916 00000000`000000a4 : nt!KiTimerExpiration+0x1be
fffff800`00b9cc90 fffff800`02a996fa : fffff800`02c09e80 fffff800`02c17c40 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff800`00b9cd40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!IppRestructureHashTableUnderLock+69
fffff880`016567c9 84c0 test al,al
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: tcpip!IppRestructureHashTableUnderLock+69
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc26e
FAILURE_BUCKET_ID: X64_0xA_tcpip!IppRestructureHashTableUnderLock+69
BUCKET_ID: X64_0xA_tcpip!IppRestructureHashTableUnderLock+69
Followup: MachineOwner
---------
rax=fffff80000b9c020 rbx=fffff88001787800 rcx=000000000000000a
rdx=ffffea80093ce410 rsi=000000000000003f rdi=0000000000000075
rip=fffff80002a90f00 rsp=fffff80000b9bf18 rbp=fffff80000b9c0e0
r8=0000000000000002 r9=0000000000000000 r10=fffff80002a3e567
r11=fffff6fb7aa00248 r12=0000000000000001 r13=fffff8800176b9a0
r14=fffff80000b9c340 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
nt!KeBugCheckEx:
fffff800`02a90f00 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff800`00b9bf20=000000000000000a
Child-SP RetAddr : Args to Child : Call Site
fffff800`00b9bf18 fffff800`02a90469 : 00000000`0000000a ffffea80`093ce410 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9bf20 fffff800`02a8f0e0 : fffff800`00b9c128 fffff880`01787800 fffffa80`07777340 00000000`00000801 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c060 fffff800`02a3e567 : fffffa80`07deb010 fffff880`01787800 00000000`00020000 fffff880`00000000 : nt!KiPageFault+0x260 (TrapFrame @ fffff800`00b9c060)
fffff800`00b9c1f0 fffff880`016567c9 : fffff880`01787800 fffffa80`07bfbca0 00000000`00000000 00000000`00000000 : nt!RtlExpandHashTable+0xe7
fffff800`00b9c220 fffff880`0166c206 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`016572a0 : tcpip!IppRestructureHashTableUnderLock+0x69
fffff800`00b9c250 fffff880`0166c559 : fffffa80`07bb6f00 00000000`00000000 fffff800`00b9c340 fffff800`00b9c390 : tcpip!IppFlushNeighborSet+0x96
fffff800`00b9c2c0 fffff880`01656da7 : fffff880`0176b9a0 fffffa80`07bb6f00 fffffa80`07bfbd30 fffffa80`07c1bb58 : tcpip!IppNeighborSetTimeout+0x23f
fffff800`00b9c410 fffff880`01657488 : fffffa80`07c1bb58 00000000`00000000 00000000`ffffff00 fffff800`00b9c5c0 : tcpip!Ipv4pInterfaceSetTimeout+0x1dc
fffff800`00b9c490 fffff880`0165630a : 00000000`00000000 fffff800`00b9c5c0 00000000`00000001 fffff800`02a9aa9a : tcpip!IppCompartmentSetTimeout+0x88
fffff800`00b9c500 fffff800`02a9cfa6 : 00000000`00000000 00000001`00000000 01535242`40c40089 00000008`00000002 : tcpip!IppTimeout+0x5a
fffff800`00b9c530 fffff800`02a9c326 : fffff880`01787880 00000000`000007a5 00000000`00000000 fffffa80`07deac60 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5a0 fffff800`02a9ce7e : 00000000`1232a367 fffff800`00b9cc18 00000000`000007a5 fffff800`02c0d728 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cbf0 fffff800`02a9c697 : 00000000`03f4c9c1 00000000`000007a5 00000000`03f4c916 00000000`000000a4 : nt!KiTimerExpiration+0x1be
fffff800`00b9cc90 fffff800`02a996fa : fffff800`02c09e80 fffff800`02c17c40 00000000`00000002 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff800`00b9cd40 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd00 00000000`00000000 : nt!KiIdleLoop+0x5a
start end module name
fffff800`00bc6000 fffff800`00bd0000 kdcom kdcom.dll Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`02a1f000 fffff800`02ffc000 nt ntkrnlmp.exe Tue Jul 14 01: 40: 48 2009 (4A5BC600)
fffff800`02ffc000 fffff800`03045000 hal hal.dll Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00cf2000 fffff880`00d36000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 03: 29: 10 2009 (4A5BDF66)
fffff880`00d36000 fffff880`00d4a000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00d4a000 fffff880`00da8000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00da8000 fffff880`00dd2000 ataport ataport.SYS Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`00dd2000 fffff880`00ddd000 msahci msahci.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`00ddd000 fffff880`00ded000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00ded000 fffff880`00df8000 amdxata amdxata.sys Tue May 19 19: 56: 59 2009 (4A12F2EB)
fffff880`00e00000 fffff880`00e09000 compbatt compbatt.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`00e09000 fffff880`00e15000 BATTC BATTC.SYS Tue Jul 14 01: 31: 01 2009 (4A5BC3B5)
fffff880`00e15000 fffff880`00e2a000 volmgr volmgr.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00e2a000 fffff880`00e86000 volmgrx volmgrx.sys Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00e8e000 fffff880`00f32000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00f32000 fffff880`00f41000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00f41000 fffff880`00f98000 ACPI ACPI.sys Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00f98000 fffff880`00fa1000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fa1000 fffff880`00fab000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00fab000 fffff880`00fde000 pci pci.sys Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00fde000 fffff880`00feb000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00feb000 fffff880`01000000 partmgr partmgr.sys Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`01000000 fffff880`0103a000 rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`01063000 fffff880`010af000 fltmgr fltmgr.sys Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`010af000 fffff880`010c3000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`010c3000 fffff880`01121000 msrpc msrpc.sys Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`01121000 fffff880`01194000 cng cng.sys Tue Jul 14 01: 49: 40 2009 (4A5BC814)
fffff880`01194000 fffff880`011e0000 volsnap volsnap.sys Tue Jul 14 01: 20: 08 2009 (4A5BC128)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`0121b000 fffff880`01229000 LhdX64 LhdX64.sys Mon Jan 11 16: 06: 58 2010 (4B4B3E92)
fffff880`0123b000 fffff880`013de000 Ntfs Ntfs.sys Tue Jul 14 01: 20: 47 2009 (4A5BC14F)
fffff880`013de000 fffff880`013f8000 ksecdd ksecdd.sys Tue Jul 14 01: 20: 54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Tue Jul 14 01: 50: 34 2009 (4A5BC84A)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Tue Jul 14 01: 21: 08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Tue Jul 14 01: 42: 54 2009 (4A5BC67E)
fffff880`01485000 fffff880`0148d000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`0148f000 fffff880`01581000 ndis ndis.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`01581000 fffff880`015e1000 NETIO NETIO.SYS Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`015e1000 fffff880`015f3000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`015f3000 fffff880`015fc000 hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Tue Jul 14 01: 25: 34 2009 (4A5BC26E)
fffff880`01800000 fffff880`0180b000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`0180b000 fffff880`0181c000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0181c000 fffff880`0183a000 tdx tdx.sys Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`0183a000 fffff880`01847000 TDI TDI.SYS Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`01847000 fffff880`018a1000 usbhub usbhub.sys Tue Jul 14 02: 07: 09 2009 (4A5BCC2D)
fffff880`018a2000 fffff880`018dc000 fvevol fvevol.sys Tue Jul 14 01: 22: 15 2009 (4A5BC1A7)
fffff880`018dc000 fffff880`018f2000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`018f2000 fffff880`01922000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`0195a000 fffff880`01984000 cdrom cdrom.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`01984000 fffff880`0198d000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`0198d000 fffff880`01994000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`01994000 fffff880`019a1000 avgtpx64 avgtpx64.sys Thu Jul 19 16: 07: 13 2012 (50081491)
fffff880`019a1000 fffff880`019af000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`019af000 fffff880`019d4000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`019d4000 fffff880`019e4000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`019e4000 fffff880`019ed000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019ed000 fffff880`019f6000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019f6000 fffff880`019ff000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`0242d000 fffff880`024b9000 bthport bthport.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`024b9000 fffff880`024baf00 USBD USBD.SYS Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`024bb000 fffff880`024c9000 hidusb hidusb.sys Tue Jul 14 02: 06: 22 2009 (4A5BCBFE)
fffff880`024c9000 fffff880`024e2000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02: 06: 21 2009 (4A5BCBFD)
fffff880`024e2000 fffff880`024ea080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`024eb000 fffff880`024f8000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`024f8000 fffff880`02524000 rfcomm rfcomm.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`02524000 fffff880`02534000 BthEnum BthEnum.sys Tue Jul 14 02: 06: 52 2009 (4A5BCC1C)
fffff880`02534000 fffff880`02554000 bthpan bthpan.sys Tue Jul 14 02: 07: 00 2009 (4A5BCC24)
fffff880`02554000 fffff880`02571000 usbccgp usbccgp.sys Tue Jul 14 02: 06: 45 2009 (4A5BCC15)
fffff880`02571000 fffff880`0259e100 usbvideo usbvideo.sys Tue Jul 14 02: 07: 00 2009 (4A5BCC24)
fffff880`0259f000 fffff880`025ad000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`02c68000 fffff880`02c77000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`02caa000 fffff880`02d34000 afd afd.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`02d34000 fffff880`02d79000 netbt netbt.sys Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`02d79000 fffff880`02d82000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02d82000 fffff880`02da8000 pacer pacer.sys Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`02da8000 fffff880`02dbe000 vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`02dbe000 fffff880`02dcd000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02dcd000 fffff880`02de8000 wanarp wanarp.sys Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`02de8000 fffff880`02dfc000 termdd termdd.sys Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`03e00000 fffff880`03e43000 ks ks.sys Tue Jul 14 02: 00: 31 2009 (4A5BCA9F)
fffff880`03e43000 fffff880`03e58000 NDProxy NDProxy.SYS Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`03e8e000 fffff880`03f11000 csc csc.sys Tue Jul 14 01: 24: 26 2009 (4A5BC22A)
fffff880`03f11000 fffff880`03f2f000 dfsc dfsc.sys Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`03f2f000 fffff880`03f40000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`03f40000 fffff880`03f66000 tunnel tunnel.sys Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`03f66000 fffff880`03f95000 ndiswan ndiswan.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`03f95000 fffff880`03fb0000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`03fb0000 fffff880`03fd1000 raspptp raspptp.sys Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`03fd1000 fffff880`03feb000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`04000000 fffff880`04085000 Rt64win7 Rt64win7.sys Fri Jun 10 08: 33: 15 2011 (4DF1BAAB)
fffff880`04085000 fffff880`04089500 CmBatt CmBatt.sys Tue Jul 14 01: 31: 03 2009 (4A5BC3B7)
fffff880`0408a000 fffff880`040a0000 AcpiVpc AcpiVpc.sys Fri Nov 26 09: 40: 25 2010 (4CEF7279)
fffff880`040a0000 fffff880`040be000 i8042prt i8042prt.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`040be000 fffff880`040cd000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040cd000 fffff880`040dc000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040dc000 fffff880`040f2000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`040f2000 fffff880`040fb000 wmiacpi wmiacpi.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`040fb000 fffff880`040fc480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`040ff000 fffff880`04392000 athrx athrx.sys Wed Nov 24 20: 33: 22 2010 (4CED6882)
fffff880`04392000 fffff880`0439f000 vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`0439f000 fffff880`043af000 CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`043af000 fffff880`043c5000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`043c5000 fffff880`043e9000 rasl2tp rasl2tp.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`043e9000 fffff880`043f5000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`043f5000 fffff880`04400000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`04e72000 fffff880`04ece000 HdAudio HdAudio.sys Tue Jul 14 02: 06: 59 2009 (4A5BCC23)
fffff880`04ece000 fffff880`04f0b000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`04f0b000 fffff880`04f2d000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`04f2d000 fffff880`04f32200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`04f33000 fffff880`04f89000 IntcDAud IntcDAud.sys Tue Dec 06 12: 23: 07 2011 (4EDDFB1B)
fffff880`04f89000 fffff880`04f97000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`04f97000 fffff880`04fa3000 dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`04fa3000 fffff880`04fae000 dump_msahci dump_msahci.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`04fae000 fffff880`04fc1000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`04fc1000 fffff880`04fcd000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`04fcd000 fffff880`04fe5000 BTHUSB BTHUSB.sys Tue Jul 14 02: 06: 52 2009 (4A5BCC1C)
fffff880`0fe00000 fffff880`0fe11000 HECIx64 HECIx64.sys Wed Oct 20 01: 33: 43 2010 (4CBE2AD7)
fffff880`0fe11000 fffff880`0fe22000 usbehci usbehci.sys Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`0fe22000 fffff880`0fe78000 USBPORT USBPORT.SYS Tue Jul 14 02: 06: 31 2009 (4A5BCC07)
fffff880`0fe78000 fffff880`0fe9c000 HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`0fe9c000 fffff880`0feae000 umbus umbus.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`0feb0000 fffff880`10cc0000 igdkmd64 igdkmd64.sys Tue Mar 20 00: 31: 54 2012 (4F67C1EA)
fffff880`10cc0000 fffff880`10db4000 dxgkrnl dxgkrnl.sys Tue Jul 14 01: 38: 56 2009 (4A5BC590)
fffff880`10db4000 fffff880`10dfa000 dxgmms1 dxgmms1.sys Tue Jul 14 01: 38: 32 2009 (4A5BC578)
fffff960`00040000 fffff960`0034f000 win32k win32k.sys unavailable (00000000)
fffff960`005c0000 fffff960`005ca000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00790000 fffff960`007b7000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`01922000 fffff880`01930000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01930000 fffff880`0193c000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`0193c000 fffff880`01947000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
fffff880`01947000 fffff880`0195a000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 0000000A
Arguments ffffea80`093ce410 00000000`00000002 00000000`00000000 fffff800`02a3e567
[CPU Information]
~MHz = REG_DWORD 2195
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 42 Stepping 7
ProcessorNameString = REG_SZ Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz
Update Signature = REG_BINARY 0,0,0,0,1b,0,0,0
Update Status = REG_DWORD 2
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 1b00000000
Machine ID Information [From Smbios 2.6, DMIVersion 38, Size=2475]
BiosMajorRelease = 1
BiosMinorRelease = 66
FirmwareMajorRelease = 1
FirmwareMinorRelease = 41
BiosVendor = LENOVO
BiosVersion = 44CN42WW
BiosReleaseDate = 09/22/2011
SystemManufacturer = LENOVO
SystemProductName = HuronRiver Platform
SystemFamily = HuronRiver System
SystemVersion = Lenovo B570
SystemSKU = System SKUNumber
BaseBoardManufacturer = LENOVO
BaseBoardProduct = Emerald Lake
BaseBoardVersion = FAB1
CPUID: "Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz"
MaxSpeed: 2200
CurrentSpeed: 2195
[SMBIOS Data Tables v2.6]
[DMI Version - 38]
[2.0 Calling Convention - No]
[Table Size - 2475 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor LENOVO
BIOS Version 44CN42WW
BIOS Starting Address Segment e000
BIOS Release Date 09/22/2011
BIOS ROM Size 280000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
19: - EDD Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
31: - NEC PC-98
49: - System Vendor Reserved
51: - System Vendor Reserved
52: - System Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
08: - BIOS Boot Specification Supported
09: - Fn-Key NET-Boot Supported
10: - Specification Reserved
BIOS Major Revision 1
BIOS Minor Revision 66
EC Firmware Major Revision 1
EC Firmware Minor Revision 41
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer LENOVO
Product Name HuronRiver Platform
Version Lenovo B570
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Other
SKUNumber System SKUNumber
Family HuronRiver System
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer LENOVO
Product Emerald Lake
Version FAB1
Serial Number
Asset Tag
Feature Flags 09h
1511734644: - °c7
1511734604: - °c7
Location Part Component
Chassis Handle 0000h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer LENOVO
Chassis Type Notebook
Version 0.1
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Other
Security Status Other
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Onboard Devices Information (Type 10) - Length 6 - Handle 0022h]
Number of Devices 1
01: Type Video [enabled]
01: Description Intel(R) Extreme Graphics 3 Controller
[Onboard Devices Information (Type 10) - Length 6 - Handle 0023h]
Number of Devices 1
01: Type Sound [enabled]
01: Description Intel(R) Azalia Audio Device
[OEM Strings (Type 11) - Length 5 - Handle 0024h]
Number of Strings 1
1 This is the Intel HuronRiver CRB Platform
[System Configuration Options (Type 12) - Length 5 - Handle 0025h]
[32Bit Memory Error Information (Type 18) - Length 23 - Handle 002ah]
[Processor Information (Type 4) - Length 42 - Handle 0030h]
Socket Designation CPU
Processor Type Central Processor
Processor Family ceh - Specification Reserved
Processor Manufacturer Intel(R) Corporation
Processor ID a7060200fffbebbf
Processor Version Intel(R) Core(TM) i3-2330M CPU @ 2.20GHz
Processor Voltage 8ch - 1.2V
External Clock 100MHz
Max Speed 2200MHz
Current Speed 2200MHz
Status Enabled Populated
Processor Upgrade ZIF Socket
L1 Cache Handle 0031h
L2 Cache Handle 0032h
L3 Cache Handle 0033h
Serial Number
Asset Tag Number
Part Number TBD By OEM
[Cache Information (Type 7) - Length 19 - Handle 0031h]
Socket Designation L1-Cache
Cache Configuration 0080h - WT Enabled Int NonSocketed L1
Maximum Cache Size 0040h - 64K
Installed Size 0040h - 64K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Data
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0032h]
Socket Designation L2-Cache
Cache Configuration 0081h - WT Enabled Int NonSocketed L2
Maximum Cache Size 0100h - 256K
Installed Size 0100h - 256K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Data
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0033h]
Socket Designation L3-Cache
Cache Configuration 0182h - WB Enabled Int NonSocketed L3
Maximum Cache Size 0c00h - 3072K
Installed Size 0c00h - 3072K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity Specification Reserved
[Physical Memory Array (Type 16) - Length 15 - Handle 0034h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 16777216KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Device (Type 17) - Length 28 - Handle 0035h]
Physical Memory Array Handle 0034h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 4096MB
Form Factor 0dh - SODIMM
Device Set [None]
Device Locator ChannelA-DIMM0
Bank Locator BANK 0
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1333MHz
Manufacturer 0443
Serial Number
Asset Tag Number
Part Number RMT3020EC58E9F1333
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0036h]
Starting Address 00000000h
Ending Address 003fffffh
Memory Device Handle 0035h
Mem Array Mapped Adr Handle 003dh
Partition Row Position [Unknown]
Interleave Position 01
Interleave Data Depth 02
[Memory Device (Type 17) - Length 28 - Handle 0037h]
Physical Memory Array Handle 0034h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelA-DIMM1
Bank Locator BANK 1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [String Not Specified]
Serial Number [String Not Specified]
Asset Tag Number
Part Number [String Not Specified]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0038h]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 0037h
Mem Array Mapped Adr Handle 003dh
Partition Row Position [Unknown]
Interleave Position 01
Interleave Data Depth 02
[Memory Device (Type 17) - Length 28 - Handle 0039h]
Physical Memory Array Handle 0034h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 4096MB
Form Factor 0dh - SODIMM
Device Set [None]
Device Locator ChannelB-DIMM0
Bank Locator BANK 2
Memory Type 18h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 1333MHz
Manufacturer 830B
Serial Number
Asset Tag Number
Part Number NT4GC64B8HB0NS-CG
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ah]
Starting Address 00400000h
Ending Address 007fffffh
Memory Device Handle 0039h
Mem Array Mapped Adr Handle 003dh
Partition Row Position [Unknown]
Interleave Position 02
Interleave Data Depth 02
[Memory Device (Type 17) - Length 28 - Handle 003bh]
Physical Memory Array Handle 0034h
Memory Error Info Handle [Not Provided]
Total Width 0 bits
Data Width 0 bits
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator ChannelB-DIMM1
Bank Locator BANK 3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer [String Not Specified]
Serial Number [String Not Specified]
Asset Tag Number
Part Number [String Not Specified]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003ch]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 003bh
Mem Array Mapped Adr Handle 003dh
Partition Row Position [Unknown]
Interleave Position 02
Interleave Data Depth 02
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 003dh]
Starting Address 00000000h
Ending Address 007fffffh
Memory Array Handle 0034h
Partition Width 04
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-35349-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a57000 PsLoadedModuleList = 0xfffff800`02c94e50
Debug session time: Sat Sep 29 15: 36: 13.986 2012 (UTC + 2: 00)
System Uptime: 0 days 3: 29: 43.001
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff68800388a20, 0, fffff80002adcae2, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiAgeWorkingSet+1c2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff68800388a20, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002adcae2, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cff0e0
fffff68800388a20
FAULTING_IP:
nt!MiAgeWorkingSet+1c2
fffff800`02adcae2 488b19 mov rbx,qword ptr [rcx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003316760 -- (.trap 0xfffff88003316760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000007ffffffff8 rbx=0000000000000000 rcx=fffff68800388a20
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002adcae2 rsp=fffff880033168f0 rbp=0000000800388a20
r8=0000000000000001 r9=fffffa80072dbc08 r10=0000000000000005
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiAgeWorkingSet+0x1c2:
fffff800`02adcae2 488b19 mov rbx,qword ptr [rcx] ds: fffff688`00388a20=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b46b91 to fffff80002ac8f00
STACK_TEXT:
fffff880`033165f8 fffff800`02b46b91 : 00000000`00000050 fffff688`00388a20 00000000`00000000 fffff880`03316760 : nt!KeBugCheckEx
fffff880`03316600 fffff800`02ac6fee : 00000000`00000000 00000980`00000000 00000000`00001000 fffff800`02bfbbfe : nt! ? : FNODOBFM: `string'+0x40f5b
fffff880`03316760 fffff800`02adcae2 : 00000003`00000000 36e00000`6fbc9025 00000000`00000000 00000000`00000b6e : nt!KiPageFault+0x16e
fffff880`033168f0 fffff800`02b49a0e : fffffa80`072dbc08 fffff880`00000001 00000000`00000001 fffff880`03316b70 : nt!MiAgeWorkingSet+0x1c2
fffff880`03316aa0 fffff800`02add6e2 : 00000000`00000b6f 00000000`00000000 fffffa80`00000000 00000000`00000005 : nt! ? : FNODOBFM: `string'+0x49926
fffff880`03316b40 fffff800`02add96f : 00000000`00000008 fffff880`03316bd0 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03316b90 fffff800`02d6c166 : fffffa80`06d3f040 00000000`00000080 fffffa80`06d15890 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03316d00 fffff800`02aa7486 : fffff880`009e4180 fffffa80`06d3f040 fffff880`009eefc0 0000000d`5ed44f8f : nt!PspSystemThreadStartup+0x5a
fffff880`03316d40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiAgeWorkingSet+1c2
fffff800`02adcae2 488b19 mov rbx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiAgeWorkingSet+1c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1c2
BUCKET_ID: X64_0x50_nt!MiAgeWorkingSet+1c2
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-33524-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5b000 PsLoadedModuleList = 0xfffff800`02c98e50
Debug session time: Sat Sep 29 12: 05: 39.963 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 01: 22.978
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, 30b2001, a5f, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ? : FNODOBFM: `string'+4ac3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000030b2001
Arg3: 0000000000000a5f
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: TrustedInstall
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b23a63 to fffff80002accf00
STACK_TEXT:
fffff880`0609c8e8 fffff800`02b23a63 : 00000000`0000001a 00000000`00041284 00000000`030b2001 00000000`00000a5f : nt!KeBugCheckEx
fffff880`0609c8f0 fffff800`02afdc15 : fffff700`01080000 a5f00002`091df867 fffffa80`094b8b30 fffffa80`094b0400 : nt! ? : FNODOBFM: `string'+0x4ac3
fffff880`0609c930 fffff800`02b0ec4a : 00000000`00000000 00000000`0312ffff fffffa80`00000000 fffffa80`094b8b30 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`0609caf0 fffff800`02acc153 : ffffffff`ffffffff 00000000`011cf7b8 00000000`011cf7b0 fffffa80`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`0609cbe0 00000000`77bb009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`011cf738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bb009a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ? : FNODOBFM: `string'+4ac3
fffff800`02b23a63 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ? : FNODOBFM: `string'+4ac3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3
BUCKET_ID: X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\20\Nowy folder\092912-28610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0280a000 PsLoadedModuleList = 0xfffff800`02a47e50
Debug session time: Sat Sep 29 12: 03: 19.881 2012 (UTC + 2: 00)
System Uptime: 0 days 1: 38: 38.895
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffe8a0169c8148, 0, fffff80002b6d1fc, 7}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!CmpRemoveKeyHash+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe8a0169c8148, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002b6d1fc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ab20e0
ffffe8a0169c8148
FAULTING_IP:
nt!CmpRemoveKeyHash+4c
fffff800`02b6d1fc 488b01 mov rax,qword ptr [rcx]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031bd9f0 -- (.trap 0xfffff880031bd9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe8a0169c8140 rbx=0000000000000000 rcx=ffffe8a0169c8148
rdx=0000000000000bbe rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b6d1fc rsp=fffff880031bdb88 rbp=fffff880031bdc04
r8=00000000b2d05e15 r9=000000001f3d0fea r10=fffff8a00767f6f8
r11=fffff8a0167c25e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!CmpRemoveKeyHash+0x4c:
fffff800`02b6d1fc 488b01 mov rax,qword ptr [rcx] ds: 0001: ffffe8a0`169c8148=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028f9b19 to fffff8000287bf00
STACK_TEXT:
fffff880`031bd888 fffff800`028f9b19 : 00000000`00000050 ffffe8a0`169c8148 00000000`00000000 fffff880`031bd9f0 : nt!KeBugCheckEx
fffff880`031bd890 fffff800`02879fee : 00000000`00000000 fffff8a0`167c25d0 fffffa80`07e68100 fffff880`01287cc3 : nt! ? : FNODOBFM: `string'+0x40edb
fffff880`031bd9f0 fffff800`02b6d1fc : fffff800`02b6d3c2 fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`031bdb88 fffff800`02b6d3c2 : fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000001 00000000`00000000 : nt!CmpRemoveKeyHash+0x4c
fffff880`031bdb90 fffff800`02ad36ce : fffff8a0`167c25d0 fffff880`031bdc04 00000000`00000000 fffff880`02c43bf0 : nt!CmpCleanUpKcbCacheWithLock+0x52
fffff880`031bdbc0 fffff800`02889161 : fffff800`02ad3394 fffff800`02a1f5f8 fffffa80`06d1b040 00000000`00000000 : nt!CmpDelayCloseWorker+0x33a
fffff880`031bdc70 fffff800`02b1f166 : 6c437465`53746547 fffffa80`06d1b040 00000000`00000080 fffffa80`06d03890 : nt!ExpWorkerThread+0x111
fffff880`031bdd00 fffff800`0285a486 : fffff880`02fd5180 fffffa80`06d1b040 fffff880`02fdffc0 2873255f`65636976 : nt!PspSystemThreadStartup+0x5a
fffff880`031bdd40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CmpRemoveKeyHash+4c
fffff800`02b6d1fc 488b01 mov rax,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!CmpRemoveKeyHash+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x50_nt!CmpRemoveKeyHash+4c
BUCKET_ID: X64_0x50_nt!CmpRemoveKeyHash+4c
Followup: MachineOwner
---------
RE: BlueScreen - Adikmo - 30.09.2012 12:05
Dziś rano odpaliłem kompa i po 30 minutach pracy posypał si
ę. Ok 10 włączyłem verifier.exe, zainstalowałem AV i przez 3h na włączonym verifier.exe żadnego bsoda, teraz wyłączyłem verifiera i zobaczymy jak będzie. Czy co to oznacza ? że system sypie się przez jakiś sterownik nie z microsoftu ? zapomniałem dodać, że nawet czysty system, bez żadnych sterowników się sypie.
RE: BlueScreen - Lenovo B570 - thermalfake - 30.09.2012 21:06
Jak się sypie na czystym to oddałbym go na gwarancję. Uruchom na parę godzin memtest86. Opis how-to jest w faq na forum albo wielu stronach w sieci.
RE: BlueScreen - Lenovo B570 - Adikmo - 30.09.2012 21:13
Na gwarancji był i napisali tylko że reinstalacja systemu, uruchomię jutro memtest86 i dam znać co i jak.
RE: BlueScreen - Lenovo B570 - thermalfake - 30.09.2012 21:44
Był w serwisie Lenovo czy może sprzedawca ma własny serwis i zanim pośle sprzęt najpierw sprawdza i siebie. ?
RE: BlueScreen - Lenovo B570 - Adikmo - 02.10.2012 20:31
Był w Lenovo w Bydgoszczy i na kartce zaznaczyli "System operacyjny przeinstalowany" ale usunęli tylko. W informacjach napisali "*DIAG_INFO*-BSOD. OS reboots. OKR didn't help.HW/OS PW: n/aDLPBOX". Już sam nie wiem co robić :/ może ja go źle formatuje coś, może dać go do jakiegoś informatyka żeby zainstalował system.
RE: BlueScreen - Lenovo B570 - thermalfake - 03.10.2012 00:48
Z tego widać był w autoryzowanym serwisie Lenovo gdyż
"*DIAG_INFO*-BSOD. OS reboots oznacz opis przyjętej usterki, OKR znaczy OneKeyRecovery czyli przywrócenie fabrycznego systemu nie działa (sprzedany bez systemu albo wyciąłeś go).
Świeży system i sterowniki tylko ze strony producenta. Jak pisałem zrób sobie kopię zapasową, żebyś tego na sarmo nie powtarzał ze 100 razy.
RE: BlueScreen - Lenovo B570 - Adikmo - 30.11.2012 23:10
Od tamtego czasu pożyczyłem Windowsa XP Professional i na nim wszystko śmigało OK, przez ten miesiąc tylko raz się posypał. Teraz znów postanowiłem się pomęczyć z 7 i nadal to samo :/ ściągałem sterowniki tylko ze strony Lenovo i nadal się sypie, nawet na czystej 7.
RE: BlueScreen - Lenovo B570 - krzysiekl7 - 01.12.2012 08:34
Cytat.
"Od tamtego czasu pożyczyłem Windowsa XP Professional" .
Pożyczone tak mają nie tylko u ciebie.
|