Więc po kolei
BSODY
Wspólnym mianownikiem tych podesłanych 4 bsodów jest błąd I/O (wejścia/wyjścia).
Nie widziałem o co dokładniej chodzi dopóki nie znalazłem w kolejnym analizowanym bsodzie wpisu:
DISK_HARDWARE_ERROR: There was error with disk hardware co w powiązaniu z BUGCHECK_STR: 0xF4_IOERR daje błędy w odczycie, zapisie, transmisji danych latajacych po magistrali sprzętowej.
Problemów należy szukać w
- diagnostyce dysku twardego
- zasilaniu dysku
- taśmie sygnałowej
- wadliwej pracy kontrolera sata na płycie głównej (np dedykowany jmicron lub intelowski, sandyforce)
W nawiązaniu do diagnostyki - pełny skan powierzchni plus odczyt parametrów smart. Jeśli to dysk ssd aktualizujemy jego firmware i aktualizujemy także bios płyty głównej. Można się posłużyć przydatnym pakietem hirens'a -
http://www.hirensbootcd.org a w nim taki narzędzia jak victoria, memtest86. Narzędzia testujące wypuszczają też producenci dysków - Seagate SeaTools, Samsung hutil, WD Data Lifeguard Diagnostic, itp.
Już mi się nie chciało przeglądać załadowanych modułów tzn sterowników niesystemowych ale jeśli coś masz nieświeżego to zrób aktualizację.
Najprawdopodobniej problem się zakończy na wymianie dysku i postawieniem systemu do nowa. Klonować nie ma co bo struktura danych jest naruszona.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\11\Pliki\080912-53149-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`0341c000 PsLoadedModuleList = 0xfffff800`03660670
Debug session time: Thu Aug 9 17: 53: 20.543 2012 (UTC + 2: 00)
System Uptime: 0 days 2: 45: 20.807
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa800ab56390, fffffa800ab56670, fffff8000379a510}
Probably caused by : wininit.exe
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa800ab56390, Terminating object
Arg3: fffffa800ab56670, Process image file name
Arg4: fffff8000379a510, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa800ab56390
IMAGE_NAME: wininit.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: wininit
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: wininit.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - Instrukcja spod 0x%p odwo
BUGCHECK_STR: 0xF4_IOERR
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`03f85e38 fffff800`03822892 : 00000000`000000f4 00000000`00000003 fffffa80`0ab56390 fffffa80`0ab56670 : nt!KeBugCheckEx
fffff880`03f85e40 fffff800`037cee8b : ffffffff`ffffffff fffffa80`0aba4580 fffffa80`0ab56390 fffffa80`0ab56390 : nt!PspCatchCriticalBreak+0x92
fffff880`03f85e80 fffff800`0374df74 : ffffffff`ffffffff 00000000`00000001 fffffa80`0ab56390 00000000`00000008 : nt! ? : NNGAKEGL: `string'+0x176d6
fffff880`03f85ed0 fffff800`0349a453 : fffffa80`0ab56390 fffff800`c0000006 fffffa80`0aba4580 00000000`028b0d80 : nt!NtTerminateProcess+0xf4
fffff880`03f85f50 fffff800`03496a10 : fffff800`034e5e7f fffff880`03f86a38 fffff880`03f86790 fffff880`03f86ae0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`03f860e8 fffff800`034e5e7f : fffff880`03f86a38 fffff880`03f86790 fffff880`03f86ae0 00000000`76945c38 : nt!KiServiceLinkage
fffff880`03f860f0 fffff800`0349a842 : fffff880`03f86a38 00000000`02930000 fffff880`03f86ae0 00000000`7695164c : nt! ? : FNODOBFM: `string'+0x48e34
fffff880`03f86900 fffff800`034993ba : 00000000`00000000 00000000`76945c3b 00000000`00000001 00000000`02930000 : nt!KiExceptionDispatch+0xc2
fffff880`03f86ae0 00000000`76f38f36 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
00000000`028b14a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f38f36
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_IOERR_IMAGE_wininit.exe
BUCKET_ID: X64_0xF4_IOERR_IMAGE_wininit.exe
Followup: MachineOwner
---------
1: kd> r;kv;lmtn;.bugcheck
rax=fffff88003f85ec8 rbx=ffffffffffffff00 rcx=00000000000000f4
rdx=0000000000000003 rsi=fffffa800ab56670 rdi=fffffa800ab56390
rip=fffff8000349b1c0 rsp=fffff88003f85e38 rbp=fffff8000379a510
r8=fffffa800ab56390 r9=fffffa800ab56670 r10=fffff8000374de80
r11=fffff88003f85f48 r12=00000000c0000006 r13=00000000c0000006
r14=0000000000000008 r15=ffffffffffffffff
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000206
nt!KeBugCheckEx:
fffff800`0349b1c0 48894c2408 mov qword ptr [rsp+8],rcx ss: 0018: fffff880`03f85e40=00000000000000f4
Child-SP RetAddr : Args to Child : Call Site
fffff880`03f85e38 fffff800`03822892 : 00000000`000000f4 00000000`00000003 fffffa80`0ab56390 fffffa80`0ab56670 : nt!KeBugCheckEx
fffff880`03f85e40 fffff800`037cee8b : ffffffff`ffffffff fffffa80`0aba4580 fffffa80`0ab56390 fffffa80`0ab56390 : nt!PspCatchCriticalBreak+0x92
fffff880`03f85e80 fffff800`0374df74 : ffffffff`ffffffff 00000000`00000001 fffffa80`0ab56390 00000000`00000008 : nt! ? : NNGAKEGL: `string'+0x176d6
fffff880`03f85ed0 fffff800`0349a453 : fffffa80`0ab56390 fffff800`c0000006 fffffa80`0aba4580 00000000`028b0d80 : nt!NtTerminateProcess+0xf4
fffff880`03f85f50 fffff800`03496a10 : fffff800`034e5e7f fffff880`03f86a38 fffff880`03f86790 fffff880`03f86ae0 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`03f85f50)
fffff880`03f860e8 fffff800`034e5e7f : fffff880`03f86a38 fffff880`03f86790 fffff880`03f86ae0 00000000`76945c38 : nt!KiServiceLinkage
fffff880`03f860f0 fffff800`0349a842 : fffff880`03f86a38 00000000`02930000 fffff880`03f86ae0 00000000`7695164c : nt! ? : FNODOBFM: `string'+0x48e34
fffff880`03f86900 fffff800`034993ba : 00000000`00000000 00000000`76945c3b 00000000`00000001 00000000`02930000 : nt!KiExceptionDispatch+0xc2
fffff880`03f86ae0 00000000`76f38f36 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a (TrapFrame @ fffff880`03f86ae0)
00000000`028b14a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f38f36
start end module name
fffff800`00baf000 fffff800`00bb9000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff800`0341c000 fffff800`03a04000 nt ntkrnlmp.exe Fri May 04 10: 18: 59 2012 (4FA390F3)
fffff800`03a04000 fffff800`03a4d000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`00cc0000 fffff880`00cea000 ataport ataport.SYS Sat Nov 20 10: 19: 15 2010 (4CE79293)
fffff880`00cf4000 fffff880`00d43000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`00d43000 fffff880`00d57000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00d57000 fffff880`00db5000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00db5000 fffff880`00df1000 vmbus vmbus.sys Sat Nov 20 10: 57: 29 2010 (4CE79B89)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`00e5c000 fffff880`00e6c000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00e6c000 fffff880`00e8d000 jraid jraid.sys Tue Aug 10 11: 28: 44 2010 (4C611BCC)
fffff880`00e8d000 fffff880`00ebc000 SCSIPORT SCSIPORT.SYS Sat Nov 20 11: 34: 01 2010 (4CE7A419)
fffff880`00ebc000 fffff880`00ed6000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`00ed6000 fffff880`00eea000 winhv winhv.sys Sat Nov 20 10: 20: 02 2010 (4CE792C2)
fffff880`00eea000 fffff880`00ef3000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00ef8000 fffff880`00f9c000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00f9c000 fffff880`00fab000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00fab000 fffff880`00fde000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00fde000 fffff880`00ff3000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00ff3000 fffff880`00ffe000 msahci msahci.sys Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`01000000 fffff880`01057000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`01057000 fffff880`01060000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`01060000 fffff880`0106a000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`0106a000 fffff880`01077000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`0107c000 fffff880`011e2000 sptd sptd.sys Sun Feb 27 20: 29: 52 2011 (4D6AA630)
fffff880`011e2000 fffff880`011f7000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`011f7000 fffff880`011fe000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`01200000 fffff880`0125e000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`0125e000 fffff880`0129b000 CT20XUT CT20XUT.SYS Wed Jul 07 15: 44: 15 2010 (4C3484AF)
fffff880`012c5000 fffff880`01351000 mv91xx mv91xx.sys Fri Aug 27 11: 49: 22 2010 (4C778A22)
fffff880`01351000 fffff880`01359000 mvxxmm mvxxmm.sys Fri Aug 27 11: 49: 03 2010 (4C778A0F)
fffff880`01359000 fffff880`01364000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`01364000 fffff880`013b0000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`013b0000 fffff880`013c4000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`013c4000 fffff880`013f9000 MpFilter MpFilter.sys Fri Mar 09 12: 05: 26 2012 (4F59E3F6)
fffff880`01419000 fffff880`015bc000 Ntfs Ntfs.sys Fri Mar 11 04: 39: 39 2011 (4D79997B)
fffff880`015bc000 fffff880`015d7000 ksecdd ksecdd.sys Sat Jun 02 04: 50: 23 2012 (4FC97F6F)
fffff880`01600000 fffff880`01683000 csc csc.sys Sat Nov 20 10: 27: 12 2010 (4CE79470)
fffff880`01683000 fffff880`016f5000 cng cng.sys Sat Jun 02 05: 25: 51 2012 (4FC987BF)
fffff880`016f5000 fffff880`01706000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`01706000 fffff880`01710000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01710000 fffff880`01720000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`01720000 fffff880`01729000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01729000 fffff880`01732000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01732000 fffff880`0173b000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`0173b000 fffff880`01746000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01746000 fffff880`01757000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`01757000 fffff880`01779000 tdx tdx.sys Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`01779000 fffff880`01786000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`01786000 fffff880`017a4000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`017a4000 fffff880`017b5000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`017b5000 fffff880`017db000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`01800000 fffff880`0180e000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`0180e000 fffff880`01833000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`01839000 fffff880`0192c000 ndis ndis.sys Sat Nov 20 10: 23: 30 2010 (4CE79392)
fffff880`0192c000 fffff880`0198c000 NETIO NETIO.SYS Sat Nov 20 10: 23: 13 2010 (4CE79381)
fffff880`0198c000 fffff880`019b6000 ksecpkg ksecpkg.sys Sat Jun 02 05: 27: 11 2012 (4FC9880F)
fffff880`019b6000 fffff880`019fc000 dtsoftbus01 dtsoftbus01.sys Wed Jul 27 16: 03: 42 2011 (4E301ABE)
fffff880`01a13000 fffff880`01a3d000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`01a3d000 fffff880`01a46000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`01a4a000 fffff880`01c4d000 tcpip tcpip.sys Fri Mar 30 10: 34: 26 2012 (4F757012)
fffff880`01c4d000 fffff880`01c97000 fwpkclnt fwpkclnt.sys Sat Nov 20 10: 21: 37 2010 (4CE79321)
fffff880`01c97000 fffff880`01ca7000 vmstorfl vmstorfl.sys Sat Nov 20 10: 57: 30 2010 (4CE79B8A)
fffff880`01ca7000 fffff880`01cf3000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`01cf3000 fffff880`01cfb000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01cfb000 fffff880`01d35000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`01d35000 fffff880`01d47000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`01d47000 fffff880`01d50000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`01d50000 fffff880`01d8a000 fvevol fvevol.sys Sat Nov 20 10: 24: 06 2010 (4CE793B6)
fffff880`01d8a000 fffff880`01da0000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01da0000 fffff880`01dd0000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`01df5000 fffff880`01dfc000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`02200000 fffff880`02267000 btath_a2dp btath_a2dp.sys Thu Sep 16 13: 34: 42 2010 (4C9200D2)
fffff880`02267000 fffff880`02276000 btath_flt btath_flt.sys Thu Jun 24 08: 17: 38 2010 (4C22F882)
fffff880`02276000 fffff880`02289000 btath_lwflt btath_lwflt.sys Mon Sep 13 10: 26: 54 2010 (4C8DE04E)
fffff880`02289000 fffff880`022a6000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`022ac000 fffff880`02338000 bthport bthport.sys Thu Apr 28 05: 55: 07 2011 (4DB8E51B)
fffff880`02338000 fffff880`02364000 rfcomm rfcomm.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`02364000 fffff880`02374000 BthEnum BthEnum.sys Tue Jul 14 02: 06: 52 2009 (4A5BCC1C)
fffff880`02374000 fffff880`02394000 bthpan bthpan.sys Tue Jul 14 02: 07: 00 2009 (4A5BCC24)
fffff880`02394000 fffff880`023b8e00 btath_rcp btath_rcp.sys Thu Jun 24 08: 17: 21 2010 (4C22F871)
fffff880`023b9000 fffff880`023c7000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`023c7000 fffff880`023d3000 dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`023d3000 fffff880`023de000 dump_msahci dump_msahci.sys Sat Nov 20 11: 33: 58 2010 (4CE7A416)
fffff880`023de000 fffff880`023f1000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`023f1000 fffff880`023fd000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`03000000 fffff880`03038000 ctsfm2k ctsfm2k.sys Wed Jul 07 15: 38: 10 2010 (4C348342)
fffff880`0304c000 fffff880`03140000 dxgkrnl dxgkrnl.sys Sat Nov 20 10: 50: 50 2010 (4CE799FA)
fffff880`03140000 fffff880`03186000 dxgmms1 dxgmms1.sys Sat Nov 20 10: 49: 53 2010 (4CE799C1)
fffff880`03186000 fffff880`031aa000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`031aa000 fffff880`031bb000 usbehci usbehci.sys Fri Mar 25 04: 29: 04 2011 (4D8C0C00)
fffff880`031bb000 fffff880`031ca000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`031ca000 fffff880`031d5000 btath_bus btath_bus.sys Thu Jun 24 08: 17: 43 2010 (4C22F887)
fffff880`031d5000 fffff880`031e7000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`031e7000 fffff880`031fc000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`06c00000 fffff880`06c1b000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`06c1b000 fffff880`06c2f000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff880`06c2f000 fffff880`06c80000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`06c80000 fffff880`06c8c000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`06c8c000 fffff880`06c97000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`06c97000 fffff880`06ca6000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`06cb4000 fffff880`06d3d000 afd afd.sys Wed Dec 28 04: 59: 20 2011 (4EFA9418)
fffff880`06d3d000 fffff880`06d82000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`06d82000 fffff880`06d8b000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06d8b000 fffff880`06db1000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`06db1000 fffff880`06dc7000 vwififlt vwififlt.sys Tue Jul 14 02: 07: 22 2009 (4A5BCC3A)
fffff880`06dc7000 fffff880`06dd6000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06dd6000 fffff880`06df3000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`07200000 fffff880`07243000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`07243000 fffff880`07274000 ctoss2k ctoss2k.sys Wed Jul 07 15: 38: 24 2010 (4C348350)
fffff880`07274000 fffff880`0727c000 ctprxy2k ctprxy2k.sys Wed Jul 07 15: 42: 17 2010 (4C348439)
fffff880`0727c000 fffff880`07281200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`07282000 fffff880`072b2000 nusb3xhc nusb3xhc.sys Thu Sep 30 06: 00: 03 2010 (4CA40B43)
fffff880`072b2000 fffff880`072b3f00 USBD USBD.SYS Fri Mar 25 04: 28: 59 2011 (4D8C0BFB)
fffff880`072b4000 fffff880`072ce000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`072ce000 fffff880`072d9000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`072d9000 fffff880`072e8000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`072ee000 fffff880`07396b80 ctaud2k ctaud2k.sys Wed Jul 07 15: 42: 14 2010 (4C348436)
fffff880`07397000 fffff880`073d4000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`073d4000 fffff880`073f6000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`07600000 fffff880`0760c000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`0760c000 fffff880`0763b000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`0763b000 fffff880`07656000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`07656000 fffff880`07677000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`07677000 fffff880`07678480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`0767e000 fffff880`0771d000 netr28x netr28x.sys Thu Feb 26 04: 02: 09 2009 (49A60631)
fffff880`0771d000 fffff880`0772a000 vwifibus vwifibus.sys Tue Jul 14 02: 07: 21 2009 (4A5BCC39)
fffff880`0772a000 fffff880`07736000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`07736000 fffff880`07743000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 14: 17: 04 2009 (4A1151C0)
fffff880`07743000 fffff880`07790000 aw5d52xd aw5d52xd.SYS Mon Mar 28 17: 41: 57 2011 (4D90AC45)
fffff880`07790000 fffff880`07799000 wmiacpi wmiacpi.sys Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`07799000 fffff880`077af000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`077af000 fffff880`077bf000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`077bf000 fffff880`077d5000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`077d5000 fffff880`077f9000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`07a00000 fffff880`07a4a000 emupia2k emupia2k.sys Wed Jul 07 15: 38: 03 2010 (4C34833B)
fffff880`07a4a000 fffff880`07a63000 nusb3hub nusb3hub.sys Thu Sep 30 06: 00: 03 2010 (4CA40B43)
fffff880`07a69000 fffff880`07bf6000 ha20x22k ha20x22k.sys Wed Jul 07 15: 41: 25 2010 (4C348405)
fffff880`07c00000 fffff880`07c29000 nvhda64v nvhda64v.sys Tue Sep 07 22: 08: 40 2010 (4C869BC8)
fffff880`07c29000 fffff880`07c4c000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`07c4c000 fffff880`07c6d000 WudfPf WudfPf.sys Sat Nov 20 11: 42: 44 2010 (4CE7A624)
fffff880`07c76000 fffff880`07dda000 CTEXFIFX CTEXFIFX.SYS Wed Jul 07 15: 44: 03 2010 (4C3484A3)
fffff880`07dda000 fffff880`07def000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`07e00000 fffff880`07e18000 BTHUSB BTHUSB.sys Thu Apr 28 05: 54: 56 2011 (4DB8E510)
fffff880`07e18000 fffff880`07e7b000 btath_hcrp btath_hcrp.sys Tue Jun 29 11: 30: 43 2010 (4C29BD43)
fffff880`07e7b000 fffff880`07e89000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`07e89000 fffff880`07ee5000 HdAudio HdAudio.sys Sat Nov 20 11: 44: 23 2010 (4CE7A687)
fffff880`07ee5000 fffff880`07f02000 usbccgp usbccgp.sys Fri Mar 25 04: 29: 14 2011 (4D8C0C0A)
fffff880`07f02000 fffff880`07f0f000 nx6000 nx6000.sys Thu Jan 28 00: 36: 09 2010 (4B60CDE9)
fffff880`07f0f000 fffff880`07f3c280 usbvideo usbvideo.sys Sat Nov 20 11: 44: 34 2010 (4CE7A692)
fffff880`07f3d000 fffff880`07f57c80 usbaudio usbaudio.sys Sat Nov 20 11: 43: 52 2010 (4CE7A668)
fffff880`07f58000 fffff880`07f66000 hidusb hidusb.sys Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`07f66000 fffff880`07f7f000 HIDCLASS HIDCLASS.SYS Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`07f7f000 fffff880`07f87080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`07f88000 fffff880`07f96000 kbdhid kbdhid.sys Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff880`07f96000 fffff880`07fa3000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`07fa3000 fffff880`07fea000 btfilter btfilter.sys Fri Oct 22 08: 40: 47 2010 (4CC131EF)
fffff880`07fea000 fffff880`07ff4000 uxpatch uxpatch.sys Mon Jul 13 07: 09: 18 2009 (4A5AC17E)
fffff880`08812000 fffff880`08865000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`08865000 fffff880`08878000 ndisuio ndisuio.sys Sat Nov 20 11: 50: 08 2010 (4CE7A7E0)
fffff880`08878000 fffff880`08890000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`08890000 fffff880`08959000 HTTP HTTP.sys Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`08959000 fffff880`08977000 bowser bowser.sys Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff880`08977000 fffff880`0898f000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`0898f000 fffff880`089bc000 mrxsmb mrxsmb.sys Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`08e37000 fffff880`08e85000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`08e85000 fffff880`08ea9000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`08ea9000 fffff880`08ecd000 ntk_PowerDVD12_64 ntk_PowerDVD12_64.sys Thu May 12 14: 30: 24 2011 (4DCBD2E0)
fffff880`08ecd000 fffff880`08f73000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`08f73000 fffff880`08f7e000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`08f7e000 fffff880`08faf000 srvnet srvnet.sys Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`08faf000 fffff880`08fc1000 tcpipreg tcpipreg.sys Sat Nov 20 11: 51: 48 2010 (4CE7A844)
fffff880`08fc1000 fffff880`08fec000 000 000.fcl Fri Sep 26 15: 11: 22 2008 (48DCDF7A)
fffff880`09611000 fffff880`0967a000 srv2 srv2.sys Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`0967a000 fffff880`09712000 srv srv.sys Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`09712000 fffff880`0971b000 ALSysIO64 ALSysIO64.sys Sun Jul 10 02: 27: 45 2011 (4E18F201)
fffff880`0971b000 fffff880`0971ca80 MSPQM MSPQM.sys Tue Jul 14 02: 00: 17 2009 (4A5BCA91)
fffff880`0971d000 fffff880`0971ec00 MSPCLOCK MSPCLOCK.sys Tue Jul 14 02: 00: 17 2009 (4A5BCA91)
fffff880`0971f000 fffff880`09729000 mbam mbam.sys Tue Mar 20 17: 04: 48 2012 (4F68AAA0)
fffff880`0f400000 fffff880`0f456000 USBPORT USBPORT.SYS Fri Mar 25 04: 29: 12 2011 (4D8C0C08)
fffff880`0f456000 fffff880`0f4b0000 usbhub usbhub.sys Fri Mar 25 04: 29: 25 2011 (4D8C0C15)
fffff880`0f4c0000 fffff880`101de000 nvlddmkm nvlddmkm.sys Fri Feb 10 03: 02: 58 2012 (4F347AD2)
fffff880`101de000 fffff880`101df180 nvBridge nvBridge.kmd Tue Nov 09 17: 30: 43 2010 (4CD97733)
fffff880`101e0000 fffff880`101fc000 CTHWIUT CTHWIUT.SYS Wed Jul 07 15: 44: 19 2010 (4C3484B3)
fffff960`00000000 fffff960`00315000 win32k win32k.sys Tue Jun 12 05: 08: 08 2012 (4FD6B298)
fffff960`004f0000 fffff960`004fa000 TSDDD TSDDD.dll Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff960`00710000 fffff960`00737000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`09729000 fffff880`0979a000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`01dd0000 fffff880`01dde000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`01dde000 fffff880`01dea000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01dea000 fffff880`01df5000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
fffff880`01a00000 fffff880`01a13000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 000000F4
Arguments 00000000`00000003 fffffa80`0ab56390 fffffa80`0ab56670 fffff800`0379a510
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\11\Pliki\080912-31137-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`03457000 PsLoadedModuleList = 0xfffff800`0369b670
Debug session time: Thu Aug 9 14: 40: 12.435 2012 (UTC + 2: 00)
System Uptime: 1 days 11: 11: 07.700
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
.....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {fffff6fc4000a998, ffffffffc000000e, 203279860, fffff88001533648}
GetPointerFromAddress: unable to read from fffff80003705278
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc4000a998, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 0000000203279860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff88001533648, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc000000e - Okre
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c000000e
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800bc600c0 -- (.trap 0xfffff8800bc600c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000084d01
rdx=fffff8800bc61740 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001533648 rsp=fffff8800bc60258 rbp=fffff8800bc60390
r8=fffff88001533648 r9=fffff8800bc60390 r10=fffff8800bc61200
r11=fffff8800bc602c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
Ntfs! ? : NNGAKEGL: `string'+0x25bd:
fffff880`01533648 0000 add byte ptr [rax],al ds: 0001: 00000000`00000001=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003543542 to fffff800034d61c0
STACK_TEXT:
fffff880`0bc5fda8 fffff800`03543542 : 00000000`0000007a fffff6fc`4000a998 ffffffff`c000000e 00000002`03279860 : nt!KeBugCheckEx
fffff880`0bc5fdb0 fffff800`034fcfff : fffffa80`0ca07e90 fffff880`0bc5ff20 fffff800`03708540 fffffa80`0ca07e90 : nt! ? : FNODOBFM: `string'+0x3717a
fffff880`0bc5fe90 fffff800`034e3789 : 00000000`00000000 00000000`00000008 ffffffff`ffffffff fffff880`0bc60010 : nt!MiIssueHardFault+0x28b
fffff880`0bc5ff60 fffff800`034d42ee : 00000000`00000008 fffff880`01533648 fffff880`0bc60300 fffff880`01495c60 : nt!MmAccessFault+0x1399
fffff880`0bc600c0 fffff880`01533648 : fffff800`0350145f fffff880`0bc5f8d0 fffffa80`07514ac0 fffffa80`0769b950 : nt!KiPageFault+0x16e
fffff880`0bc60258 fffff800`0350145f : fffff880`0bc5f8d0 fffffa80`07514ac0 fffffa80`0769b950 00000000`00000000 : Ntfs! ? : NNGAKEGL: `string'+0x25bd
fffff880`0bc60260 fffff800`03500ead : fffff880`0bc61740 fffff880`0bc61740 00000000`00000000 fffff880`01444000 : nt!_C_specific_handler+0x13f
fffff880`0bc602d0 fffff800`035008f8 : fffff880`0bc61740 fffff880`0bc60350 fffff880`0145de28 fffff880`01444000 : nt!RtlpExecuteHandlerForUnwind+0xd
fffff880`0bc60300 fffff800`035013ec : fffff880`0bc61880 fffff880`014c86bc fffff880`0bc61140 ffffffff`c000000e : nt!RtlUnwindEx+0x472
fffff880`0bc609a0 fffff800`03500e2d : fffff880`01495b60 fffff880`0bc61880 00000000`00000000 fffff880`01444000 : nt!_C_specific_handler+0xcc
fffff880`0bc60a10 fffff800`034ffc05 : fffff880`01495b60 fffff880`0bc60a88 fffff880`0bc61140 fffff880`01444000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0bc60a40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDispatchException+0x415
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !Ntfs
fffff88001533001-fffff88001533008 8 bytes - Ntfs! ? : NNGAKEGL: `string'+1ec3
[ ff 15 79 6c f5 ff be 01: 00 00 00 00 00 00 00 00 ]
fffff8800153300c-fffff8800153302d 34 bytes - Ntfs! ? : NNGAKEGL: `string'+1ece (+0x0b)
[ 89 75 20 48 8d 4d 28 e8: 00 00 00 00 00 00 00 00 ]
fffff88001533030-fffff88001533036 7 bytes - Ntfs! ? : NNGAKEGL: `string'+1ef2 (+0x24)
[ ff 15 2a 6c f5 ff eb: 00 00 00 00 00 00 00 ]
fffff88001533038-fffff8800153304c 21 bytes - Ntfs! ? : NNGAKEGL: `string'+1efa (+0x08)
[ 48 83 c4 28 5e 5d c3 90: 00 00 00 00 00 00 00 00 ]
fffff88001533050-fffff88001533060 17 bytes - Ntfs! ? : NNGAKEGL: `string'+1f18 (+0x18)
[ 33 db 48 3b cb 74 0d ff: 00 00 00 00 00 00 00 00 ]
fffff88001533064-fffff88001533067 4 bytes - Ntfs! ? : NNGAKEGL: `string'+1f2c (+0x14)
[ 48 8b 9d 88: 00 00 00 00 ]
fffff8800153306b-fffff88001533076 12 bytes - Ntfs! ? : NNGAKEGL: `string'+1f33 (+0x07)
[ 48 8b 53 60 48 8b 52 70: 00 00 00 00 00 00 00 00 ]
fffff8800153307a-fffff88001533083 10 bytes - Ntfs! ? : NNGAKEGL: `string'+1f42 (+0x0f)
[ e8 f1 08 f2 ff 48 8d 8b: 00 00 00 00 00 00 00 00 ]
fffff88001533086-fffff8800153308c 7 bytes - Ntfs! ? : NNGAKEGL: `string'+1f4e (+0x0c)
[ ff 15 d4 6b f5 ff eb: 00 00 00 00 00 00 00 ]
fffff8800153308e-fffff880015330a2 21 bytes - Ntfs! ? : NNGAKEGL: `string'+1f56 (+0x08)
[ 48 83 c4 38 5d 5b c3 90: 00 00 00 00 00 00 00 00 ]
fffff880015330a4-fffff880015330a9 6 bytes - Ntfs! ? : NNGAKEGL: `string'+1f7d (+0x16)
[ 74 1d 48 83 7d 68: 00 00 00 00 00 00 ]
fffff880015330ab-fffff880015330b5 11 bytes - Ntfs! ? : NNGAKEGL: `string'+1f84 (+0x07)
[ 74 16 48 8d 55 68 48 8b: 00 00 00 00 00 00 00 00 ]
fffff880015330b8-fffff880015330c1 10 bytes - Ntfs! ? : NNGAKEGL: `string'+1f91 (+0x0d)
[ 48 8b 49 50 e8 c7 3f f1: 00 00 00 00 00 00 00 00 ]
fffff880015330c3-fffff880015330e0 30 bytes - Ntfs! ? : NNGAKEGL: `string'+1f9c (+0x0b)
[ 48 83 c4 60 5d c3 90 90: 00 00 00 00 00 00 00 00 ]
fffff880015330e3-fffff88001533102 32 bytes - Ntfs! ? : NNGAKEGL: `string'+1fc8 (+0x20)
[ e8 a8 b7 fc ff 48 8b 4d: 00 00 00 00 00 00 00 00 ]
fffff88001533105-fffff8800153310c 8 bytes - Ntfs! ? : NNGAKEGL: `string'+1fea (+0x22)
[ 48 83 c1 68 48 8d 95 e8: 00 00 00 00 00 00 00 00 ]
fffff88001533110-fffff88001533112 3 bytes - Ntfs! ? : NNGAKEGL: `string'+1ff5 (+0x0b)
[ 41 b8 38: 00 00 00 ]
fffff88001533116-fffff8800153311b 6 bytes - Ntfs! ? : NNGAKEGL: `string'+1ffb (+0x06)
[ e8 f5 f0 f1 ff eb: 00 00 00 00 00 00 ]
fffff8800153311d-fffff88001533193 119 bytes - Ntfs! ? : NNGAKEGL: `string'+2002 (+0x07)
[ 48 83 c4 58 5d 5b c3 53: 00 00 00 00 00 00 00 00 ]
fffff88001533197-fffff8800153319a 4 bytes - Ntfs! ? : NNGAKEGL: `string'+2083 (+0x7a)
[ f0 83 80 88: 00 00 00 00 ]
fffff8800153319e-fffff880015331ab 14 bytes - Ntfs! ? : NNGAKEGL: `string'+208a (+0x07)
[ ff 48 8b 48 70 f0 83 41: 00 00 00 00 00 00 00 00 ]
fffff880015331ae-fffff880015331c5 24 bytes - Ntfs! ? : NNGAKEGL: `string'+209a (+0x10)
[ 74 17 45 33 c9 45 33 c0: 00 00 00 00 00 00 00 00 ]
fffff880015331c7-fffff880015331df 25 bytes - Ntfs! ? : NNGAKEGL: `string'+20b3 (+0x19)
[ 48 83 c4 40 5f 5d 5b c3: 00 00 00 00 00 00 00 00 ]
fffff880015331e3-fffff880015331e8 6 bytes - Ntfs! ? : NNGAKEGL: `string'+20d5 (+0x1c)
[ e8 a8 b6 fc ff eb: 00 00 00 00 00 00 ]
fffff880015331ea-fffff880015331ff 22 bytes - Ntfs! ? : NNGAKEGL: `string'+20dc (+0x07)
[ 48 83 c4 50 5d c3 55 48: 00 00 00 00 00 00 00 00 ]
fffff88001533203-fffff88001533208 6 bytes - Ntfs! ? : NNGAKEGL: `string'+20fc (+0x19)
[ e8 88 b6 fc ff eb: 00 00 00 00 00 00 ]
fffff8800153320a-fffff8800153321b 18 bytes - Ntfs! ? : NNGAKEGL: `string'+2103 (+0x07)
[ 48 83 c4 50 5d c3 55 48: 00 00 00 00 00 00 00 00 ]
fffff8800153321f-fffff88001533221 3 bytes - Ntfs! ? : NNGAKEGL: `string'+2120 (+0x15)
[ 48 8b 8d: 00 00 00 ]
fffff88001533223 - Ntfs! ? : NNGAKEGL: `string'+2124 (+0x04)
[ 03: 00 ]
fffff88001533226-fffff8800153322f 10 bytes - Ntfs! ? : NNGAKEGL: `string'+2127 (+0x03)
[ e8 65 b6 fc ff 4c 8d 9d: 00 00 00 00 00 00 00 00 ]
fffff88001533232-fffff88001533243 18 bytes - Ntfs! ? : NNGAKEGL: `string'+2133 (+0x0c)
[ 48 8b 4d 70 49 3b cb 74: 00 00 00 00 00 00 00 00 ]
fffff88001533245-fffff88001533257 19 bytes - Ntfs! ? : NNGAKEGL: `string'+2146 (+0x13)
[ 48 83 c4 60 5d c3 90 55: 00 00 00 00 00 00 00 00 ]
fffff8800153325b-fffff8800153325e 4 bytes - Ntfs! ? : NNGAKEGL: `string'+2162 (+0x16)
[ 48 8b 8d d0: 00 00 00 00 ]
fffff88001533262-fffff88001533269 8 bytes - Ntfs! ? : NNGAKEGL: `string'+2169 (+0x07)
[ e8 09 07 f2 ff 80 7d 50: 00 00 00 00 00 00 00 00 ]
fffff8800153326b-fffff88001533274 10 bytes - Ntfs! ? : NNGAKEGL: `string'+2172 (+0x09)
[ 74 12 48 8d 55 60 48 8b: 00 00 00 00 00 00 00 00 ]
fffff88001533278-fffff8800153327d 6 bytes - Ntfs! ? : NNGAKEGL: `string'+217f (+0x0d)
[ e8 13 b6 fc ff eb: 00 00 00 00 00 00 ]
fffff8800153327f-fffff88001533297 25 bytes - Ntfs! ? : NNGAKEGL: `string'+2186 (+0x07)
[ 48 83 c4 50 5d c3 90 90: 00 00 00 00 00 00 00 00 ]
fffff8800153329b-fffff880015332a3 9 bytes - Ntfs! ? : NNGAKEGL: `string'+21a6 (+0x1c)
[ e8 f0 b5 fc ff 48 8b 8d: 00 00 00 00 00 00 00 00 ]
fffff880015332a7-fffff880015332b2 12 bytes - Ntfs! ? : NNGAKEGL: `string'+21b2 (+0x0c)
[ 48 85 c9 74 08 ff 15 de: 00 00 00 00 00 00 00 00 ]
fffff880015332b4-fffff880015332d6 35 bytes - Ntfs! ? : NNGAKEGL: `string'+21bf (+0x0d)
[ 48 83 c4 50 5d c3 90 90: 00 00 00 00 00 00 00 00 ]
fffff880015332d8-fffff880015332df 8 bytes - Ntfs! ? : NNGAKEGL: `string'+21e8 (+0x24)
[ 48 8d 55 70 48 8b 8d d0: 00 00 00 00 00 00 00 00 ]
fffff880015332e3-fffff880015332e8 6 bytes - Ntfs! ? : NNGAKEGL: `string'+21f3 (+0x0b)
[ e8 a8 b5 fc ff eb: 00 00 00 00 00 00 ]
fffff880015332ea-fffff88001533332 73 bytes - Ntfs! ? : NNGAKEGL: `string'+21fa (+0x07)
[ 48 83 c4 50 5d c3 55 57: 00 00 00 00 00 00 00 00 ]
fffff88001533334-fffff88001533359 38 bytes - Ntfs! ? : NNGAKEGL: `string'+2255 (+0x4a)
[ 48 83 c4 38 5f 5d c3 90: 00 00 00 00 00 00 00 00 ]
fffff8800153335d-fffff88001533365 9 bytes - Ntfs! ? : NNGAKEGL: `string'+2284 (+0x29)
[ 74 16 33 d2 48 8b 8f 18: 00 00 00 00 00 00 00 00 ]
fffff88001533368-fffff88001533371 10 bytes - Ntfs! ? : NNGAKEGL: `string'+228f (+0x0b)
[ e8 cb 15 f8 ff 48 83 a7: 00 00 00 00 00 00 00 00 ]
fffff88001533375-fffff88001533381 13 bytes - Ntfs! ? : NNGAKEGL: `string'+229c (+0x0d)
[ 48 8b 4d 50 48 85 c9 74: 00 00 00 00 00 00 00 00 ]
fffff88001533383-fffff88001533394 18 bytes - Ntfs! ? : NNGAKEGL: `string'+22aa (+0x0e)
[ 48 8b 4d 48 48 85 c9 74: 00 00 00 00 00 00 00 00 ]
fffff88001533396-fffff880015333af 26 bytes - Ntfs! ? : NNGAKEGL: `string'+22bd (+0x13)
[ 48 83 c4 38 5f 5d c3 90: 00 00 00 00 00 00 00 00 ]
fffff880015333b3-fffff880015333b8 6 bytes - Ntfs! ? : NNGAKEGL: `string'+22de (+0x1d)
[ e8 d8 b4 fc ff eb: 00 00 00 00 00 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3687 errors : !Ntfs (fffff88001533001-fffff88001533fff)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE_4096
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE_4096
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE_4096
Followup: memory_corruption
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\11\Pliki\080712-23649-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`03417000 PsLoadedModuleList = 0xfffff800`0365b670
Debug session time: Tue Aug 7 22: 49: 29.298 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 03: 40.563
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa8007d15b30, fffffa8007d15e10, fffff80003795510}
Probably caused by : csrss.exe
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa8007d15b30, Terminating object
Arg3: fffffa8007d15e10, Process image file name
Arg4: fffff80003795510, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa8007d15b30
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: csrss.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - Instrukcja spod 0x%p odwo
BUGCHECK_STR: 0xF4_IOERR
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`02d68e38 fffff800`0381d892 : 00000000`000000f4 00000000`00000003 fffffa80`07d15b30 fffffa80`07d15e10 : nt!KeBugCheckEx
fffff880`02d68e40 fffff800`037c9e8b : ffffffff`ffffffff fffffa80`0a876060 fffffa80`07d15b30 fffffa80`07d15b30 : nt!PspCatchCriticalBreak+0x92
fffff880`02d68e80 fffff800`03748f74 : ffffffff`ffffffff 00000000`00000001 fffffa80`07d15b30 00000000`00000008 : nt! ? : NNGAKEGL: `string'+0x176d6
fffff880`02d68ed0 fffff800`03495453 : fffffa80`07d15b30 fffff800`c0000006 fffffa80`0a876060 00000000`00410dc0 : nt!NtTerminateProcess+0xf4
fffff880`02d68f50 fffff800`03491a10 : fffff800`034e0e7f fffff880`02d69a38 fffff880`02d69790 fffff880`02d69ae0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02d690e8 fffff800`034e0e7f : fffff880`02d69a38 fffff880`02d69790 fffff880`02d69ae0 000007fe`fdc32784 : nt!KiServiceLinkage
fffff880`02d690f0 fffff800`03495842 : fffff880`02d69a38 00000000`00450000 fffff880`02d69ae0 000007fe`fdc41c5c : nt! ? : FNODOBFM: `string'+0x48e34
fffff880`02d69900 fffff800`034943ba : 00000000`00000000 000007fe`fdbd0824 00000000`76ed8d01 00000000`00450000 : nt!KiExceptionDispatch+0xc2
fffff880`02d69ae0 00000000`76dc8f55 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
00000000`004114e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76dc8f55
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_IOERR_IMAGE_csrss.exe
BUCKET_ID: X64_0xF4_IOERR_IMAGE_csrss.exe
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\11\Pliki\070612-78062-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`0344d000 PsLoadedModuleList = 0xfffff800`03691670
Debug session time: Fri Jul 6 20: 37: 47.770 2012 (UTC + 2: 00)
System Uptime: 0 days 1: 57: 05.034
Loading Kernel Symbols
...............................................................
................................................................
..........................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, fffffa800ae86b30, fffffa800ae86e10, fffff800037cb510}
Probably caused by : wininit.exe
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa800ae86b30, Terminating object
Arg3: fffffa800ae86e10, Process image file name
Arg4: fffff800037cb510, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: fffffa800ae86b30
IMAGE_NAME: wininit.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: wininit
FAULTING_MODULE: 0000000000000000
PROCESS_NAME: wininit.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
BUGCHECK_STR: 0xF4_C0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`05899e38 fffff800`03853892 : 00000000`000000f4 00000000`00000003 fffffa80`0ae86b30 fffffa80`0ae86e10 : nt!KeBugCheckEx
fffff880`05899e40 fffff800`037ffe8b : ffffffff`ffffffff fffffa80`074a3b50 fffffa80`0ae86b30 fffffa80`0ae86b30 : nt!PspCatchCriticalBreak+0x92
fffff880`05899e80 fffff800`0377ef74 : ffffffff`ffffffff 00000000`00000001 fffffa80`0ae86b30 00000000`00000008 : nt! ? : NNGAKEGL: `string'+0x176d6
fffff880`05899ed0 fffff800`034cb453 : fffffa80`0ae86b30 fffff800`c0000005 fffffa80`074a3b50 00000000`00d10840 : nt!NtTerminateProcess+0xf4
fffff880`05899f50 fffff800`034c7a10 : fffff800`03516e7f fffff880`0589aa38 fffff880`0589a790 fffff880`0589aae0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0589a0e8 fffff800`03516e7f : fffff880`0589aa38 fffff880`0589a790 fffff880`0589aae0 00000000`00d12350 : nt!KiServiceLinkage
fffff880`0589a0f0 fffff800`034cb842 : fffff880`0589aa38 00000000`0000aab7 fffff880`0589aae0 00000000`00d11e28 : nt! ? : FNODOBFM: `string'+0x48e34
fffff880`0589a900 fffff800`034ca3ba : 00000000`00000001 00000000`00d10f58 00000000`76de8d01 00000000`0000aab7 : nt!KiExceptionDispatch+0xc2
fffff880`0589aae0 00000000`76cd8e3d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
00000000`00d10f60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76cd8e3d
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0xF4_C0000005_IMAGE_wininit.exe
BUCKET_ID: X64_0xF4_C0000005_IMAGE_wininit.exe
Followup: MachineOwner
---------
Teraz dziennik zdarzeń
System
Najważniejsze błędy od najnowszych
Cytat:Wykonywanie kopii w tle woluminu C: zostało przerwane, ponieważ nie można powiększyć magazynu kopii w tle z powodu limitu wprowadzonego przez użytkownika.
-----
Sterownik wykrył błąd kontrolera na \Device\Harddisk1\DR5.
To jest błąd odczytu z dysku i potwierdzenie i którym wcześniej pisałem
----
Nastąpił ponowny rozruch komputera po operacji wykrywania błędów. Wyniki tej operacji były następujące: 0x000000f4 (0x0000000000000003, 0xfffffa800ab56390, 0xfffffa800ab56670, 0xfffff8000379a510). Zrzut zapisano w: C:\Windows\MEMORY.DMP. Identyfikator raportu: 080912-53149-01.
Zapisany bsod.
----
System został uruchomiony ponownie bez uprzedniego czystego zamknięcia. Przyczyną tego błędu może być fakt, że system przestał odpowiadać, uległ awarii lub nastąpiła nieoczekiwana utrata zasilania.
Tu po drodze był restart automatyczny albo przez użytkownika power-off
-----
Struktura systemu plików na dysku jest uszkodzona i nie nadaje się do użytku. Uruchom narzędzie chkdsk na woluminie Windows.
Uszkodzona struktura systemu plikowego na dysku w związku z tym o czym pisałem.
-----
Usługa Protokół rozpoznawania nazw równorzędnych zakończyła działanie; wystąpił następujący błąd:
Struktura dysku jest uszkodzona i nieczytelna.
-----
Nie można odnaleźć opisu dla identyfikatora zdarzenia 1119 ze źródła Microsoft Antimalware. Albo składnik wywołujący to zdarzenie nie jest zainstalowany na komputerze lokalnym, albo instalacja jest uszkodzona. Możesz zainstalować lub naprawić składnik na komputerze.
-----
Usługa Windows Update zawiesiła się podczas uruchamiania.
-----
Sterownik wykrył błąd wewnętrzny w swoich strukturach danych dla . (sptd,sys)
Ten sterownik to zło i wiele osób profesjonalnie trudniących się analizą bsodów każe wywalać aplikacje pokroju Daemon Tools - http://www.duplexsecure.com/faq/
-----
Instalacja nie powiodła się: system Windows nie mógł zainstalować następującej aktualizacji, ponieważ wystąpił błąd 0x80070643: Niemiecki pakiet językowy — system Windows 7 dla komputerów z procesorem x64 (KB972813).