Na razie się zastosuj do tego o czym pisałem a potem będziemy myśleć.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\1\070312-24928-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c55670
Debug session time: Tue Jul 3 13: 02: 29.189 2012 (UTC + 2: 00)
System Uptime: 0 days 5: 00: 30.594
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, 12dff001, 9b70, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ? : FNODOBFM: `string'+4ac3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000012dff001
Arg3: 0000000000009b70
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: plugin-contain
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ae6bd7 to fffff80002a901c0
STACK_TEXT:
fffff880`047c1208 fffff800`02ae6bd7 : 00000000`0000001a 00000000`00041284 00000000`12dff001 00000000`00009b70 : nt!KeBugCheckEx
fffff880`047c1210 fffff800`02aa97a9 : fffffa80`03eb2948 ffffffff`ffffffff fffffa80`04111750 ffffffff`ffffffff : nt! ? : FNODOBFM: `string'+0x4ac3
fffff880`047c1250 fffff800`02a84fcb : b7000000`17ed1867 fffff680`00096ff8 ffffffff`ffffffff 000fffff`ffffffff : nt!MiTerminateWsle+0x29
fffff880`047c1290 fffff800`02a7c712 : 00000000`12c00000 00000000`00000000 fffffa80`03eb25b0 fffffa80`03eb2948 : nt!MiDecommitPages+0x20b
fffff880`047c1b20 fffff800`02a8f453 : ffffffff`ffffffff 00000000`0017e2c0 00000000`0017e2b8 00000000`00004000 : nt!NtFreeVirtualMemory+0x382
fffff880`047c1c20 00000000`77b914fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0017e288 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b914fa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ? : FNODOBFM: `string'+4ac3
fffff800`02ae6bd7 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ? : FNODOBFM: `string'+4ac3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4fa390f3
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3
BUCKET_ID: X64_0x1a_41284_nt!_??_: FNODOBFM: _string_+4ac3
Followup: MachineOwner
---------
Na temat drugiego błędu znajdziesz informacje na forum.
VIDEO_TDR_FAILURE 0xc00000116
Po tych 2 latach przydało by się wyczyścić solidnie sprzęt w środku.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\1\070212-20638-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c9e670
Debug session time: Mon Jul 2 20: 07: 18.256 2012 (UTC + 2: 00)
System Uptime: 0 days 1: 47: 47.661
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa8004946010, fffff88013d1aaa4, ffffffffc000009a, 4}
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+ca1aa4 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8004946010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88013d1aaa4, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
nvlddmkm+ca1aa4
fffff880`13d1aaa4 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`050aeb88 fffff880`02d42000 : 00000000`00000116 fffffa80`04946010 fffff880`13d1aaa4 ffffffff`c000009a : nt!KeBugCheckEx
fffff880`050aeb90 fffff880`02d15867 : fffff880`13d1aaa4 fffffa80`05f24000 00000000`00000000 ffffffff`c000009a : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`050aebd0 fffff880`02d41e0f : fffffa80`ffffd84d ffffffff`fffe7960 fffffa80`04946010 00000000`00000000 : dxgkrnl!DXGADAPTER: Reset+0x2a3
fffff880`050aec80 fffff880`02c37ec1 : fffffa80`04638930 00000000`00000080 00000000`00000000 fffffa80`05f80010 : dxgkrnl!TdrResetFromTimeout+0x23
fffff880`050aed00 fffff800`02d6fe6a : 00000000`039c7f2a fffffa80`05ea3060 fffffa80`039ea040 fffffa80`05ea3060 : dxgmms1!VidSchiWorkerThread+0x101
fffff880`050aed40 fffff800`02ac9ec6 : fffff800`02c4be80 fffffa80`05ea3060 fffff800`02c59cc0 00000001`0cadc000 : nt!PspSystemThreadStartup+0x5a
fffff880`050aed80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nvlddmkm+ca1aa4
fffff880`13d1aaa4 4883ec28 sub rsp,28h
SYMBOL_NAME: nvlddmkm+ca1aa4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f4e68c4
FAILURE_BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys
BUCKET_ID: X64_0x116_IMAGE_nvlddmkm.sys
Followup: MachineOwner
---------