Częste Blue Screen-y - kawin - 06.02.2015 23:47
Witam
Od kilku dni nękają mnie ciągłe blue screeny nie umiem doszukać się ich powodu . Reinstalowałem system i sytuacja się poprawiła gdyż pojawiają się rzadziej ale dalej są problemem załączam pliki *.dmp z folderu c:\windows\minidump
http://www10.zippyshare.com/v/I8pEOCio/file.html
Pozdrawiam
RE: Częste Blue Screen-y - thermalfake - 07.02.2015 09:22
Na razie ostatni.
PAGE_FAULT_IN_NONPAGED_AREA (50)
Powód - dane zareferencjonowane z konkretnego adresu w argumencie nr 1 nie mogły zostać odczytane przez instrukcję z adresu w argumencie nr 3. Dwa przypadki - kiedy sterownik urządzenia lub wirtualny (np antywirus) wykonał nieprawidłową operację uwolnienia adresu w argumencie nr 1 bądź mamy uszkodzoną pamięć ram.
Ręczna analiza wykonana przeze mnie wskazuje (ale jeszcze na 100% nie potwierdzam) na to iż jest to uszkodzenie pamięci ram.
Więc przez kilka godzin trzeba zapuścić memtest -> http://forum.komputerswiat.pl/topic/34636-diagnostyka-pamieci-ram-w-komputerze/
Jeśli sypnie błędami to postarać się o inne egzemplarze, ewentualnie podmienić slotami na drugi kanał dual, sprawdzić poprawność pracy w biosie (timingi, napięcie vdimm).
Proszę także dla pewności włączyć weryfikację sterowników na jeden dzień i popracować.
Cytat:- Kliknij Start, wpisz cmd a potem verifier.exe
- Zaznacz opcję "Utwórz ustawienia niestandardowe".
- Kliknij "Wybierz indywidualne ustawienia z pełnej listy".
- Zaznacz opcje -> Pula specjalna - Śledzenie puli - Wymuszanie sprawdzenia IRQL.
- Kliknij "Wybierz nazwy sterowników z listy" po czym chwilę czekamy.
- Zaznaczamy wszystkie sterowniki nie pochodzące od Microsoft (sortujemy wg kolumny Dostawca).
- Klikamy zakończ, uruchamiamy ponownie komputer i czekamy pracując sobie na złe lub dobre wieści czy system się wysypie bsodem czy nie, sugeruję dobre kilka godzin.
- Wpisujemy verifier.exe /reset aby zakończyć diagnostykę sterowników i uruchamiamy sprzęt ponownie.
Ponadto wywal oprogramowanie do płyty głównej (Gigabyte Easy Saver) bo to śmieci oraz zaktualizuj sterownik grafiki nvidii bo jest z 2009r. Jeżeli poinstalowałeś drivery z płytek a tak być musiało (stare divery lan, audio z 2008/2009) to je poaktualizuj teraz z sieci np ze stron producentów układów..
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02ca2e90
Debug session time: Fri Feb 6 22: 48: 27.001 2015 (UTC + 1: 00)
System Uptime: 0 days 0: 00: 59.795
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6fe40070e30, 0, fffff80002bdb4d7, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiCaptureAndResetWorkingSetAccessBits+97 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6fe40070e30, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002bdb4d7, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e8
fffff6fe40070e30
FAULTING_IP:
nt!MiCaptureAndResetWorkingSetAccessBits+97
fffff800`02bdb4d7 488b5d00 mov rbx,qword ptr [rbp]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003516870 -- (.trap 0xfffff88003516870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=0000000000000000 rcx=007ffffe40070e30
rdx=fffffa800157ede0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002bdb4d7 rsp=fffff88003516a00 rbp=fffff6fe40070e30
r8=0000000000000001 r9=0000000000000014 r10=0000000000000014
r11=fffff8800151b000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiCaptureAndResetWorkingSetAccessBits+0x97:
fffff800`02bdb4d7 488b5d00 mov rbx,qword ptr [rbp] ss: 0018: fffff6fe`40070e30=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a87c6f to fffff80002add640
STACK_TEXT:
fffff880`03516708 fffff800`02a87c6f : 00000000`00000050 fffff6fe`40070e30 00000000`00000000 fffff880`03516870 : nt!KeBugCheckEx
fffff880`03516710 fffff800`02adb76e : 00000000`00000000 fffff6fe`40070e30 fffff880`031d3100 c9a00000`72a4a963 : nt! ? : FNODOBFM: `string'+0x44891
fffff880`03516870 fffff800`02bdb4d7 : 71a00000`a5bd9847 fffff6fb`40001dc0 fffff700`010863f0 fffff880`07db9001 : nt!KiPageFault+0x16e
fffff880`03516a00 fffff800`02b56697 : 00000000`00000000 00000000`00000010 fffff880`031d37f0 fffff880`031d37f0 : nt!MiCaptureAndResetWorkingSetAccessBits+0x97
fffff880`03516b00 fffff800`02ac8206 : 00000000`0000003b 00000000`00000000 fffffa80`00000000 00000000`00000006 : nt! ? : FNODOBFM: `string'+0x4d898
fffff880`03516b80 fffff800`02ac8638 : 00000000`00000008 fffff880`03516c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03516bd0 fffff800`02d7acce : fffffa80`04003040 00000000`00000080 fffffa80`03fe4040 00000000`00000001 : nt!KeBalanceSetManager+0x138
fffff880`03516d40 fffff800`02acefe6 : fffff880`03163180 fffffa80`04003040 fffff880`0316dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03516d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiCaptureAndResetWorkingSetAccessBits+97
fffff800`02bdb4d7 488b5d00 mov rbx,qword ptr [rbp]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiCaptureAndResetWorkingSetAccessBits+97
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiCaptureAndResetWorkingSetAccessBits+97
BUCKET_ID: X64_0x50_nt!MiCaptureAndResetWorkingSetAccessBits+97
Followup: MachineOwner
---------
3: kd> !pte fffff6fe40070e30
VA fffffc800e1c6000
PXE at FFFFF6FB7DBEDFC8 PPE at FFFFF6FB7DBF9000 PDE at FFFFF6FB7F200380 PTE at FFFFF6FE40070E30
contains 0000000000000000
not valid
3: kd> kv
Child-SP RetAddr : Args to Child : Call Site
fffff880`03516708 fffff800`02a87c6f : 00000000`00000050 fffff6fe`40070e30 00000000`00000000 fffff880`03516870 : nt!KeBugCheckEx
fffff880`03516710 fffff800`02adb76e : 00000000`00000000 fffff6fe`40070e30 fffff880`031d3100 c9a00000`72a4a963 : nt! ? : FNODOBFM: `string'+0x44891
fffff880`03516870 fffff800`02bdb4d7 : 71a00000`a5bd9847 fffff6fb`40001dc0 fffff700`010863f0 fffff880`07db9001 : nt!KiPageFault+0x16e (TrapFrame @ fffff880`03516870)
fffff880`03516a00 fffff800`02b56697 : 00000000`00000000 00000000`00000010 fffff880`031d37f0 fffff880`031d37f0 : nt!MiCaptureAndResetWorkingSetAccessBits+0x97
fffff880`03516b00 fffff800`02ac8206 : 00000000`0000003b 00000000`00000000 fffffa80`00000000 00000000`00000006 : nt! ? : FNODOBFM: `string'+0x4d898
fffff880`03516b80 fffff800`02ac8638 : 00000000`00000008 fffff880`03516c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03516bd0 fffff800`02d7acce : fffffa80`04003040 00000000`00000080 fffffa80`03fe4040 00000000`00000001 : nt!KeBalanceSetManager+0x138
fffff880`03516d40 fffff800`02acefe6 : fffff880`03163180 fffffa80`04003040 fffff880`0316dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03516d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
3: kd> .trap fffff880`03516870
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000098000000000 rbx=0000000000000000 rcx=007ffffe40070e30
rdx=fffffa800157ede0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002bdb4d7 rsp=fffff88003516a00 rbp=fffff6fe40070e30
r8=0000000000000001 r9=0000000000000014 r10=0000000000000014
r11=fffff8800151b000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiCaptureAndResetWorkingSetAccessBits+0x97:
fffff800`02bdb4d7 488b5d00 mov rbx,qword ptr [rbp] ss: 0018: fffff6fe`40070e30=?
3: kd> !pte fffff6fe`40070e30
VA fffffc800e1c6000
PXE at FFFFF6FB7DBEDFC8 PPE at FFFFF6FB7DBF9000 PDE at FFFFF6FB7F200380 PTE at FFFFF6FE40070E30
contains 0000000000000000
not valid
3: kd> dd fffff6fe`40070e30
fffff6fe`40070e30 ? ? ? ?
fffff6fe`40070e40 ? ? ? ?
fffff6fe`40070e50 ? ? ? ?
fffff6fe`40070e60 ? ? ? ?
fffff6fe`40070e70 ? ? ? ?
fffff6fe`40070e80 ? ? ? ?
fffff6fe`40070e90 ? ? ? ?
fffff6fe`40070ea0 ? ? ? ?
CPUID: "Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz"
MaxSpeed: 2330
CurrentSpeed: 2333
[SMBIOS Data Tables v2.4]
[DMI Version - 36]
[2.0 Calling Convention - No]
[Table Size - 1180 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor Award Software International, Inc.
BIOS Version F7
BIOS Starting Address Segment e000
BIOS Release Date 08/15/2008
BIOS ROM Size 100000
BIOS Characteristics
07: - PCI Supported
09: - Plug and Play Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
19: - EDD Supported
22: - 360KB Floppy Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 255
BIOS Minor Revision 255
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer Gigabyte Technology Co., Ltd.
Product Name EP43-S3L
Version
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber
Family
[BaseBoard Information (Type 2) - Length 8 - Handle 0002h]
Manufacturer Gigabyte Technology Co., Ltd.
Product EP43-S3L
Version x.x
Serial Number
[System Enclosure (Type 3) - Length 17 - Handle 0003h]
Manufacturer Gigabyte Technology Co., Ltd.
Chassis Type Desktop
Version
Serial Number
Asset Tag Number
Bootup State Unknown
Power Supply State Unknown
Thermal State Unknown
Security Status Unknown
OEM Defined 0
[Processor Information (Type 4) - Length 35 - Handle 0004h]
Socket Designation Socket 775
Processor Type Central Processor
Processor Family 01h - Other
Processor Manufacturer Intel
Processor ID 77060100fffbebbf
Processor Version Intel(R) Core(TM)2 Quad CPU
Processor Voltage 8ah - 1.0V
External Clock 333MHz
Max Speed 4000MHz
Current Speed 2333MHz
Status Enabled Populated
Processor Upgrade Socket 478
L1 Cache Handle 000ah
L2 Cache Handle 000bh
L3 Cache Handle [Not Present]
Serial Number
Asset Tag Number
Part Number
[Memory Controller Information (Type 5) - Length 24 - Handle 0005h]
Error Detecting Method 04h - 8-bit Parity
Error Correcting Capability 04h - None
Supported Interleave 03h - One Way Interleave
Current Interleave 03h - One Way Interleave
Maximum Memory Module Size 0ah - 1024MB
Supported Speeds 0001h - Other
Supported Memory Types 0001h - Other
Memory Module Voltage 5V
Number of Memory Slots 4
Memory Slot Handle 0006h
Memory Slot Handle 0007h
Memory Slot Handle 0008h
Memory Slot Handle 0009h
Enabled Err Correcting Caps 04h - None
[Memory Module Information (Type 6) - Length 12 - Handle 0006h]
Socket Designation A0
Bank Connections 1fh - 1
Current Speed 31ns
Current Memory Type 0001h - Other
Installed Size 0bh - 2048 [single bank]
Enabled Size 0bh - 2048 [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0007h]
Socket Designation A1
Bank Connections 2fh - 2
Current Speed 47ns
Current Memory Type 0002h - Unknown
Installed Size 7fh - [Not Installed] [single bank]
Enabled Size 7fh - [Not Installed] [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0008h]
Socket Designation A2
Bank Connections 3fh - 3
Current Speed 63ns
Current Memory Type 0001h - Other
Installed Size 0bh - 2048 [single bank]
Enabled Size 0bh - 2048 [single bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0009h]
Socket Designation A3
Bank Connections 4fh - 4
Current Speed 79ns
Current Memory Type 0002h - Unknown
Installed Size 7fh - [Not Installed] [single bank]
Enabled Size 7fh - [Not Installed] [single bank]
Error Status 00h - [No Errors]
[Cache Information (Type 7) - Length 19 - Handle 000ah]
Socket Designation Internal Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0040h - 64K
Installed Size 0040h - 64K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Cache Information (Type 7) - Length 19 - Handle 000bh]
Socket Designation External Cache
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 0800h - 2048K
Installed Size 0800h - 2048K
Supported SRAM Type 0020h - Synchronous
Current SRAM Type 0020h - Synchronous
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Physical Memory Array (Type 16) - Length 15 - Handle 0019h]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 4194304KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Device (Type 17) - Length 27 - Handle 001ah]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator A0
Bank Locator Bank0/1
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 800MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001bh]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width [Unknown]
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator A1
Bank Locator Bank2/3
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001ch]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator A2
Bank Locator Bank4/5
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 800MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Device (Type 17) - Length 27 - Handle 001dh]
Physical Memory Array Handle 0019h
Memory Error Info Handle [Not Provided]
Total Width [Unknown]
Data Width [Unknown]
Size [Not Populated]
Form Factor 09h - DIMM
Device Set [None]
Device Locator A3
Bank Locator Bank6/7
Memory Type 02h - Unknown
Type Detail 0000h -
Speed 0MHz
Manufacturer
Serial Number
Asset Tag Number
Part Number
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 001eh]
Starting Address 00000000h
Ending Address 003fffffh
Memory Array Handle 0019h
Partition Width 01
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 001fh]
Starting Address 00000000h
Ending Address 001fffffh
Memory Device Handle 001ah
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0020h]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 001bh
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0021h]
Starting Address 00200000h
Ending Address 003fffffh
Memory Device Handle 001ch
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0022h]
Starting Address 00000000h
Ending Address 00000000h
Memory Device Handle 001dh
Mem Array Mapped Adr Handle 001eh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
start end module name
fffff880`00d62000 fffff880`00db9000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`02e25000 fffff880`02eae000 afd afd.sys Sat Nov 20 10: 23: 27 2010 (4CE7938F)
fffff880`075db000 fffff880`075f1000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`011ca000 fffff880`011d5000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`0118c000 fffff880`01195000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01195000 fffff880`011bf000 ataport ataport.SYS Sat Nov 20 10: 19: 15 2010 (4CE79293)
fffff880`07402000 fffff880`07588000 athrx athrx.sys Wed Nov 24 01: 11: 58 2010 (4CEC584E)
fffff880`01899000 fffff880`018a0000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`06d2f000 fffff880`06d40000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`0b18d000 fffff880`0b1ab000 bowser bowser.sys Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff960`00750000 fffff960`00777000 cdd cdd.dll unavailable (00000000)
fffff880`0b75e000 fffff880`0b77b000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`01600000 fffff880`0162a000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`00e4a000 fffff880`00f0a000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`01800000 fffff880`01830000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00d04000 fffff880`00d62000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01573000 fffff880`015e5000 cng cng.sys Sat Nov 20 11: 08: 45 2010 (4CE79E2D)
fffff880`075cb000 fffff880`075db000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`0b783000 fffff880`0b791000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`06c8e000 fffff880`06d11000 csc csc.sys Sat Nov 20 10: 27: 12 2010 (4CE79470)
fffff880`06d11000 fffff880`06d2f000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`02e00000 fffff880`02e0f000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`01be1000 fffff880`01bf7000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`093d8000 fffff880`093fa000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`01851000 fffff880`01899000 dtsoftbus01 dtsoftbus01.sys Fri Feb 21 10: 49: 36 2014 (53072130)
fffff880`0cdd9000 fffff880`0cdec000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`0ccc9000 fffff880`0cdd9000 dump_iaStor dump_iaStor.sys Thu May 08 02: 15: 59 2008 (4822463F)
fffff880`09200000 fffff880`0920c000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`06ac1000 fffff880`06bb5000 dxgkrnl dxgkrnl.sys Sat Nov 20 10: 50: 50 2010 (4CE799FA)
fffff880`06bb5000 fffff880`06bfb000 dxgmms1 dxgmms1.sys Sat Nov 20 10: 49: 53 2010 (4CE799C1)
fffff880`07595000 fffff880`075a2000 fdc fdc.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`0104c000 fffff880`01060000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`06c5a000 fffff880`06c65000 flpydisk flpydisk.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`01000000 fffff880`0104c000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`015f6000 fffff880`01600000 Fs_Rec Fs_Rec.sys Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`01ba7000 fffff880`01be1000 fvevol fvevol.sys Sat Nov 20 10: 24: 06 2010 (4CE793B6)
fffff880`01aa4000 fffff880`01aee000 fwpkclnt fwpkclnt.sys Sat Nov 20 10: 21: 37 2010 (4CE79321)
fffff880`0b77b000 fffff880`0b783000 gdrv gdrv.sys Sat Oct 13 09: 22: 00 2007 (47107218)
fffff800`02a14000 fffff800`02a5d000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`06a74000 fffff880`06a98000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`0921a000 fffff880`09233000 HIDCLASS HIDCLASS.SYS Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`06c7a000 fffff880`06c82080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`0920c000 fffff880`0921a000 hidusb hidusb.sys Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`0b0c4000 fffff880`0b18d000 HTTP HTTP.sys Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`01b9e000 fffff880`01ba7000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`0107c000 fffff880`0118c000 iaStor iaStor.sys Thu May 08 02: 15: 59 2008 (4822463F)
fffff880`06d66000 fffff880`06d7c000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`082c2000 fffff880`082d1000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06ddc000 fffff880`06dea000 kbdhid kbdhid.sys Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff800`00bab000 fffff800`00bb5000 kdcom kdcom.dll Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff880`06d7c000 fffff880`06dbf000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`01558000 fffff880`01573000 ksecdd ksecdd.sys Sat Nov 20 10: 21: 15 2010 (4CE7930B)
fffff880`016a1000 fffff880`016cc000 ksecpkg ksecpkg.sys Sat Nov 20 11: 10: 34 2010 (4CE79E9A)
fffff880`093fa000 fffff880`093ff200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`01830000 fffff880`01845000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`016cc000 fffff880`016ef000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`00ca1000 fffff880`00cf0000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`02e0f000 fffff880`02e1d000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`082d1000 fffff880`082e0000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06dea000 fffff880`06df7000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`0b1ab000 fffff880`0b1c3000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`0b1c3000 fffff880`0b1f0000 mrxsmb mrxsmb.sys Sat Nov 20 10: 27: 41 2010 (4CE7948D)
fffff880`0b000000 fffff880`0b04d000 mrxsmb10 mrxsmb10.sys Sat Nov 20 10: 26: 53 2010 (4CE7945D)
fffff880`0b04d000 fffff880`0b071000 mrxsmb20 mrxsmb20.sys Sat Nov 20 10: 26: 47 2010 (4CE79457)
fffff880`011bf000 fffff880`011ca000 msahci msahci.sys Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`01225000 fffff880`01230000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00fc6000 fffff880`00fd0000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`014fa000 fffff880`01558000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`02ff0000 fffff880`02ffb000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`01b8c000 fffff880`01b9e000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01400000 fffff880`014f3000 ndis ndis.sys Sat Nov 20 10: 23: 30 2010 (4CE79392)
fffff880`075f1000 fffff880`075fd000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`01742000 fffff880`01755000 ndisuio ndisuio.sys Sat Nov 20 11: 50: 08 2010 (4CE7A7E0)
fffff880`08232000 fffff880`08261000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`06c65000 fffff880`06c7a000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`02f38000 fffff880`02f47000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02eae000 fffff880`02ef3000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`01641000 fffff880`016a1000 NETIO NETIO.SYS Sat Nov 20 10: 23: 13 2010 (4CE79381)
fffff880`013de000 fffff880`013ef000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`02fe4000 fffff880`02ff0000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff800`02a5d000 fffff800`03047000 nt ntkrnlmp.exe Sat Nov 20 10: 30: 02 2010 (4CE7951A)
fffff880`0123b000 fffff880`013de000 Ntfs Ntfs.sys Sat Nov 20 10: 20: 57 2010 (4CE792F9)
fffff880`01bf7000 fffff880`01c00000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`082e4000 fffff880`08debb00 nvlddmkm nvlddmkm.sys Thu May 14 22: 48: 07 2009 (4A0C8387)
fffff880`016ef000 fffff880`01742000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`02efc000 fffff880`02f22000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`075ae000 fffff880`075cb000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`00fd0000 fffff880`00fe5000 partmgr partmgr.sys Sat Nov 20 10: 20: 00 2010 (4CE792C0)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00e40000 fffff880`00e47000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00c5c000 fffff880`00c6c000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`015e5000 fffff880`015f6000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`0b494000 fffff880`0b53a000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`0939b000 fffff880`093d8000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`00cf0000 fffff880`00d04000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`06a98000 fffff880`06abc000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`08261000 fffff880`0827c000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0827c000 fffff880`0829d000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`0829d000 fffff880`082b7000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`02f93000 fffff880`02fe4000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`082b7000 fffff880`082c2000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`017ec000 fffff880`017f5000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`017f5000 fffff880`017fe000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01638000 fffff880`01641000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`01b52000 fffff880`01b8c000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`01755000 fffff880`0176d000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`08200000 fffff880`08232000 Rt64win7 Rt64win7.sys Thu Feb 26 10: 04: 13 2009 (49A65B0D)
fffff880`09234000 fffff880`0939ac00 RTKVHD64 RTKVHD64.sys Fri Jun 27 05: 21: 58 2008 (48645CD6)
fffff880`0b53a000 fffff880`0b545000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`075a2000 fffff880`075ae000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`02f47000 fffff880`02f64000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`01b4a000 fffff880`01b52000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`0b6c5000 fffff880`0b75e000 srv srv.sys Sat Nov 20 10: 28: 05 2010 (4CE794A5)
fffff880`0b588000 fffff880`0b5f3000 srv2 srv2.sys Sat Nov 20 10: 27: 43 2010 (4CE7948F)
fffff880`0b545000 fffff880`0b576000 srvnet srvnet.sys Sat Nov 20 10: 27: 20 2010 (4CE79478)
fffff880`075fd000 fffff880`075fe480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`018a0000 fffff880`01aa4000 tcpip tcpip.sys Sat Nov 20 10: 25: 52 2010 (4CE79420)
fffff880`0b576000 fffff880`0b588000 tcpipreg tcpipreg.sys Sat Nov 20 11: 51: 48 2010 (4CE7A844)
fffff880`013ef000 fffff880`013fc000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`011d5000 fffff880`011f7000 tdx tdx.sys Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`02f7f000 fffff880`02f93000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff960`00460000 fffff960`0046a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`06d40000 fffff880`06d66000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`08dec000 fffff880`08dfe000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`06dbf000 fffff880`06ddc000 usbccgp usbccgp.sys Sat Nov 20 11: 44: 03 2010 (4CE7A673)
fffff880`07400000 fffff880`07401f00 USBD USBD.SYS Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`06a63000 fffff880`06a74000 usbehci usbehci.sys Sat Nov 20 11: 43: 54 2010 (4CE7A66A)
fffff880`06c00000 fffff880`06c5a000 usbhub usbhub.sys Sat Nov 20 11: 44: 30 2010 (4CE7A68E)
fffff880`06a0d000 fffff880`06a63000 USBPORT USBPORT.SYS Sat Nov 20 11: 44: 00 2010 (4CE7A670)
fffff880`06a00000 fffff880`06a0d000 usbuhci usbuhci.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`0162a000 fffff880`01638000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`01200000 fffff880`01225000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`01aee000 fffff880`01afe000 vmstorfl vmstorfl.sys Sat Nov 20 10: 57: 30 2010 (4CE79B8A)
fffff880`00fe5000 fffff880`00ffa000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`01afe000 fffff880`01b4a000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`07588000 fffff880`07595000 vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`02f22000 fffff880`02f38000 vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`02f64000 fffff880`02f7f000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`017dc000 fffff880`017ec000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`00f0a000 fffff880`00fae000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00fae000 fffff880`00fbd000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`02ef3000 fffff880`02efc000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff960`000d0000 fffff960`003e0000 win32k win32k.sys unavailable (00000000)
fffff880`00fbd000 fffff880`00fc6000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
Unloaded modules:
fffff880`01830000 fffff880`0183e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`016cc000 fffff880`017dc000 dump_iaStor.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00110000
fffff880`0183e000 fffff880`01851000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
RE: Częste Blue Screen-y - thermalfake - 07.02.2015 10:52
Następny ma wspólny mianownik, problem z PFN (Page Frame Number). Ogólnie dalej problem z zarządzanie pamięci wirtualnej w systemie.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c5ee90
Debug session time: Fri Feb 6 21: 39: 46.606 2015 (UTC + 1: 00)
System Uptime: 0 days 0: 02: 28.027
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa800f77fd80, 2, 0, fffff80002b4125f}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+23f )
Followup: MachineOwner
---------
1: kd> !analyze -v
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa800f77fd80, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002b4125f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cca0e8
fffffa800f77fd80
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+23f
fffff800`02b4125f 4c8b7500 mov r14,qword ptr [rbp]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800b66e4e0 -- (.trap 0xfffff8800b66e4e0)
.trap 0xfffff8800b66e4e0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0800000000000020
rdx=000000000006107d rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b4125f rsp=fffff8800b66e670 rbp=fffffa800f77fd80
r8=00000000000678be r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiIdentifyPfn+0x23f:
fffff800`02b4125f 4c8b7500 mov r14,qword ptr [rbp] ss: 0018: fffffa80`0f77fd80=??
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a98be9 to fffff80002a99640
STACK_TEXT:
fffff880`0b66e398 fffff800`02a98be9 : 00000000`0000000a fffffa80`0f77fd80 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b66e3a0 fffff800`02a97860 : 00000000`42506650 00000000`00000000 00000000`00000000 02000000`000733fd : nt!KiBugCheckDispatch+0x69
fffff880`0b66e4e0 fffff800`02b4125f : 00000000`00000100 02000000`000716db 00000000`42506600 fffff800`02d84c8f : nt!KiPageFault+0x260
fffff880`0b66e670 fffff800`02b41f3b : 00000000`00000000 00000000`00000004 fffffa80`071b5328 fffffa80`071b5000 : nt!MiIdentifyPfn+0x23f
fffff880`0b66e710 fffff800`02ea7c05 : fffffa80`071b5000 fffff880`0b66eca0 fffff880`0b66e7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`0b66e750 fffff800`02de9de8 : 00000000`00000006 00000000`00000000 fffffa80`071b5000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
fffff880`0b66e7a0 fffff800`02da30d3 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`02aa1101 : nt! ? : NNGAKEGL: `string'+0x48fbd
fffff880`0b66e830 fffff800`02da3949 : 00000000`0202b8c8 00000000`0000088e 00000000`0202b920 00000000`070a37b8 : nt!ExpQuerySystemInformation+0x1193
fffff880`0b66ebe0 fffff800`02a988d3 : 00000000`00000000 00000000`07ab2ff8 00000000`04d39e01 00000000`046a6e60 : nt!NtQuerySystemInformation+0x4d
fffff880`0b66ec20 00000000`76df167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0202b7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76df167a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+23f
fffff800`02b4125f 4c8b7500 mov r14,qword ptr [rbp]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+23f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+23f
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+23f
Followup: MachineOwner
Dwa ostatnie bsody mają kody 0x50 czyli ten co na początku więc tylko przejrzałem i są podobne.
|