No to jedziemy z koksem.
Ostatni bsod powstał kiedy testowałeś stabilność Orthosem. Po analizie można jednoznacznie dojść do wniosku, że jego przyczyną jest błąd sprzętowy a ogólnie rzecz biorąc problemy z pamięcią RAM.
- długogodzinny memtest86 (nie zawsze w 100% skuteczny)
- sprawdzenie parametrów pracy pamięci w w biosie vdimm oraz timingi
- problem ze slotami na płycie głównej
- pamięci się gryzą z chipsetem
Cytat:FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
Część sąsiadujących ze sobą segmentów w pamięci jest fizycznie uszkodzona.
Sprawdziłem jeszcze listę załadowanych modułów. Do aktualizacji te które są sprzed 2009r a więc
9ba5f000 9ba6a900 pcouffin pcouffin.sys Tue Dec 05 15:39:53 2006 (457584B9)
9ba91000 9babf000 MarvinBus MarvinBus.sys Fri Sep 23 23:17:57 2005 (43347105)
9d400000 9d427980 V0260Vid V0260Vid.sys Sun Apr 02 09:15:19 2006 (442F7A07)
9d428000 9d431340 tifsfilt tifsfilt.sys Wed Aug 29 14:37:17 2007 (46D5687D)
9d5ec000 9d5f19c0 V0260Cmd V0260Cmd.sys Thu Mar 23 05:22:12 2006 (44222274)
a3df2000 a3dfc000 secdrv secdrv.SYS Wed Sep 13 15:18:32 2006 (45080528)
Nie chce mi się teraz wszystkiego szukać co jest od czego.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\12\081512-28423-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
Machine Name:
Kernel base = 0x83240000 PsLoadedModuleList = 0x833894d0
Debug session time: Tue Aug 14 23: 59: 32.318 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 16: 26.910
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {815, ff, 0, 832b7849}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v;r;kv;lmtn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000815, memory referenced
Arg2: 000000ff, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 832b7849, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 833a9848
Unable to read MiSystemVaType memory at 83388e20
00000815
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDispatchInterrupt+99
832b7849 035811 add ebx,dword ptr [eax+11h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: ORTHOS.exe
LAST_CONTROL_TRANSFER: from 8320e924 to 832b7849
STACK_TEXT:
b1303cec 8320e924 b1303d34 02433600 00000006 nt!KiDispatchInterrupt+0x99
b1303d34 0043c8f9 badb0d00 00000000 00000000 hal!HalpDispatchSoftwareInterrupt+0x5e
WARNING: Frame IP not in any known module. Following frames may be wrong.
b1303d40 00000000 00000000 00000000 00000000 0x43c8f9
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (832b7642-832b787a)
832b7640 00 00 *be 44 24 1c 8b 47 10 8b *94 14 03 c2 13 4c ...D$..G.......L
832b7650 24 1c *9e 44 24 20 89 4c 24 24 *09 4f 18 89 47 10 $..D$ .L$$.O..G.
832b7660 8b 47 *ea 89 47 14 8a 47 02 a8 *d8 74 1b a8 01 74 .G..G..G...t...t
832b7670 0b ff *f2 24 1c 52 56 e8 0b f8 *f1 00 f6 47 02 04 ...$.RV......G..
...
832b7840 1b 93 *87 33 00 00 8b 4f 10 03 *58 11 57 18 01 47 ...3...O..X.W..G
832b7850 10 11 *47 14 01 83 18 33 00 00 *7d 93 1c 33 00 00 ..G....3..}..3..
832b7860 f6 47 *a0 05 75 3c fb fe 83 31 *ef 00 00 89 b3 24 .G..u<...1.....$
832b7870 01 00 *c6 c6 46 68 02 c6 87 87 *da 00 00 1f 8b cf ....Fh..........
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
eax=00000804 ebx=8336ac00 ecx=3d7cab54 edx=c92079c3 esi=88d0b9f8 edi=88b225f8
eip=832b7849 esp=b1303ce0 ebp=b1303d00 iopl=0 nv up di ng nz na pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010087
nt!KiDispatchInterrupt+0x99:
832b7849 035811 add ebx,dword ptr [eax+11h] ds: 0023: 00000815=??
ChildEBP RetAddr Args to Child
b1303cec 8320e924 b1303d34 02433600 00000006 nt!KiDispatchInterrupt+0x99 (FPO: [Uses EBP] [0,0,3])
b1303d34 0043c8f9 badb0d00 00000000 00000000 hal!HalpDispatchSoftwareInterrupt+0x5e (FPO: [Non-Fpo])
WARNING: Frame IP not in any known module. Following frames may be wrong.
b1303d40 00000000 00000000 00000000 00000000 0x43c8f9
start end module name
80bad000 80bb5000 kdcom kdcom.dll Tue Jul 14 03: 08: 58 2009 (4A5BDAAA)
82600000 8261e000 cdd cdd.dll Sat Nov 20 12: 56: 35 2010 (4CE7B773)
82620000 8266d000 ATMFD ATMFD.DLL Sat Feb 19 05: 34: 53 2011 (4D5F486D)
82750000 829a1000 win32k win32k.sys Tue Jun 12 04: 40: 25 2012 (4FD6AC19)
829c0000 829c9000 TSDDD TSDDD.dll Tue Jul 14 02: 01: 40 2009 (4A5BCAE4)
83209000 83240000 hal halmacpi.dll Sat Nov 20 09: 37: 38 2010 (4CE788D2)
83240000 83652000 nt ntkrpamp.exe Sat Mar 31 04: 24: 37 2012 (4F766AE5)
8be00000 8be1f000 cdrom cdrom.sys Sat Nov 20 09: 38: 09 2010 (4CE788F1)
8be1f000 8bea4000 mcupdate mcupdate.dll Sat Nov 20 13: 00: 54 2010 (4CE7B876)
8bea4000 8beb5000 PSHED PSHED.dll Tue Jul 14 03: 09: 36 2009 (4A5BDAD0)
8beb5000 8bebd000 BOOTVID BOOTVID.dll Tue Jul 14 03: 04: 34 2009 (4A5BD9A2)
8bebd000 8beff000 CLFS CLFS.SYS Tue Jul 14 01: 11: 10 2009 (4A5BBF0E)
8beff000 8bfaa000 CI CI.dll Sat Nov 20 13: 05: 17 2010 (4CE7B97D)
8bfaa000 8bfcd000 ataport ataport.SYS Sat Nov 20 09: 38: 00 2010 (4CE788E8)
8bfcd000 8bff2000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 11: 20 2009 (4A5BBF18)
8c000000 8c012000 winhv winhv.sys Sat Nov 20 09: 38: 15 2010 (4CE788F7)
8c012000 8c01b000 atapi atapi.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
8c02c000 8c09d000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 11: 36 2009 (4A5BBF28)
8c09d000 8c0ab000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 11: 25 2009 (4A5BBF1D)
8c0ab000 8c0f3000 ACPI ACPI.sys Sat Nov 20 09: 37: 52 2010 (4CE788E0)
8c0f3000 8c0fc000 WMILIB WMILIB.SYS Tue Jul 14 01: 11: 22 2009 (4A5BBF1A)
8c0fc000 8c104000 msisadrv msisadrv.sys Tue Jul 14 01: 11: 09 2009 (4A5BBF0D)
8c104000 8c12e000 pci pci.sys Sat Nov 20 09: 37: 57 2010 (4CE788E5)
8c12e000 8c139000 vdrvroot vdrvroot.sys Tue Jul 14 01: 46: 19 2009 (4A5BC74B)
8c139000 8c14a000 partmgr partmgr.sys Sat Mar 17 06: 03: 08 2012 (4F641B0C)
8c14a000 8c15a000 volmgr volmgr.sys Sat Nov 20 09: 38: 06 2010 (4CE788EE)
8c15a000 8c1a5000 volmgrx volmgrx.sys Tue Jul 14 01: 11: 41 2009 (4A5BBF2D)
8c1a5000 8c1ac000 pciide pciide.sys Tue Jul 14 01: 11: 19 2009 (4A5BBF17)
8c1ac000 8c1ba000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
8c1ba000 8c1d0000 mountmgr mountmgr.sys Sat Nov 20 09: 38: 09 2010 (4CE788F1)
8c1d0000 8c1f9180 vmbus vmbus.sys Sat Nov 20 10: 14: 58 2010 (4CE79192)
8c200000 8c225000 ksecpkg ksecpkg.sys Sat Jun 02 04: 47: 40 2012 (4FC97ECC)
8c230000 8c272000 mv61xx mv61xx.sys Thu May 24 05: 53: 44 2012 (4FBDB0C8)
8c272000 8c298000 SCSIPORT SCSIPORT.SYS Sat Nov 20 10: 50: 55 2010 (4CE799FF)
8c298000 8c2a0000 mv61xxmm mv61xxmm.sys Thu May 24 05: 53: 37 2012 (4FBDB0C1)
8c2a0000 8c2a9000 amdxata amdxata.sys Fri Mar 19 17: 19: 01 2010 (4BA3A3F5)
8c2a9000 8c2dd000 fltmgr fltmgr.sys Tue Jul 14 01: 11: 13 2009 (4A5BBF11)
8c2dd000 8c2ee000 fileinfo fileinfo.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
8c2ee000 8c3a5000 ndis ndis.sys Sat Nov 20 09: 39: 19 2010 (4CE78937)
8c3a5000 8c3e3000 NETIO NETIO.SYS Sat Nov 20 09: 40: 03 2010 (4CE78963)
8c417000 8c546000 Ntfs Ntfs.sys Sat Nov 20 09: 39: 08 2010 (4CE7892C)
8c546000 8c571000 msrpc msrpc.sys Tue Jul 14 01: 11: 59 2009 (4A5BBF3F)
8c571000 8c584000 ksecdd ksecdd.sys Sat Jun 02 04: 25: 35 2012 (4FC9799F)
8c584000 8c5e1000 cng cng.sys Sat Jun 02 04: 46: 38 2012 (4FC97E8E)
8c5e1000 8c5ef000 pcw pcw.sys Tue Jul 14 01: 11: 10 2009 (4A5BBF0E)
8c5ef000 8c5f8000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 21: 26 2012 (4F4EEB36)
8c600000 8c632000 fvevol fvevol.sys Sat Nov 20 09: 40: 22 2010 (4CE78976)
8c639000 8c784000 tcpip tcpip.sys Fri Mar 30 10: 08: 52 2012 (4F756A14)
8c784000 8c7b5000 fwpkclnt fwpkclnt.sys Sat Nov 20 09: 39: 08 2010 (4CE7892C)
8c7b5000 8c7c6000 epfwwfp epfwwfp.sys Wed Mar 07 15: 27: 47 2012 (4F577063)
8c7c6000 8c7f3000 rdyboost rdyboost.sys Sat Nov 20 10: 00: 07 2010 (4CE78E17)
8c800000 8c811000 disk disk.sys Tue Jul 14 01: 11: 28 2009 (4A5BBF20)
8c821000 8c8b2100 timntr timntr.sys Wed Jun 02 14: 57: 37 2010 (4C065541)
8c8b3000 8c8bb380 vmstorfl vmstorfl.sys Sat Nov 20 10: 14: 37 2010 (4CE7917D)
8c8bc000 8c8fb000 volsnap volsnap.sys Sat Nov 20 09: 38: 13 2010 (4CE788F5)
8c8fb000 8c9b0fa0 tdrpm273 tdrpm273.sys Tue Aug 10 11: 56: 21 2010 (4C612245)
8c9b1000 8c9b9000 spldr spldr.sys Mon May 11 18: 13: 47 2009 (4A084EBB)
8c9b9000 8c9e0f80 snapman snapman.sys Tue Aug 10 12: 15: 28 2010 (4C6126C0)
8c9e1000 8c9f1000 mup mup.sys Tue Jul 14 01: 14: 14 2009 (4A5BBFC6)
8c9f1000 8c9f9000 hwpolicy hwpolicy.sys Sat Nov 20 09: 37: 35 2010 (4CE788CF)
91600000 91622000 ndiswan ndiswan.sys Sat Nov 20 11: 07: 48 2010 (4CE79DF4)
9162c000 916fc000 eamonm eamonm.sys Wed Mar 07 15: 32: 23 2012 (4F577177)
916fc000 91703000 Null Null.SYS Tue Jul 14 01: 11: 12 2009 (4A5BBF10)
91703000 9170a000 Beep Beep.SYS Tue Jul 14 01: 45: 00 2009 (4A5BC6FC)
9170a000 9172a000 ehdrv ehdrv.sys Wed Mar 07 15: 33: 36 2012 (4F5771C0)
9172a000 91736000 vga vga.sys Tue Jul 14 01: 25: 50 2009 (4A5BC27E)
91736000 91757000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 25: 49 2009 (4A5BC27D)
91757000 91764000 watchdog watchdog.sys Tue Jul 14 01: 24: 10 2009 (4A5BC21A)
91764000 9176c000 RDPCDD RDPCDD.sys Sat Nov 20 11: 22: 19 2010 (4CE7A15B)
9176c000 91774000 rdpencdd rdpencdd.sys Tue Jul 14 02: 01: 39 2009 (4A5BCAE3)
91774000 9177c000 rdprefmp rdprefmp.sys Tue Jul 14 02: 01: 41 2009 (4A5BCAE5)
9177c000 91787000 Msfs Msfs.SYS Tue Jul 14 01: 11: 26 2009 (4A5BBF1E)
91787000 91795000 Npfs Npfs.SYS Tue Jul 14 01: 11: 31 2009 (4A5BBF23)
91795000 917ac000 tdx tdx.sys Sat Nov 20 09: 39: 17 2010 (4CE78935)
917ac000 917b8000 TDI TDI.SYS Sat Nov 20 09: 39: 18 2010 (4CE78936)
917b8000 917e5000 1394ohci 1394ohci.sys Sat Nov 20 11: 01: 11 2010 (4CE79C67)
917e5000 917f0000 ndistapi ndistapi.sys Tue Jul 14 01: 54: 24 2009 (4A5BC930)
92000000 92034000 ctoss2k ctoss2k.sys Thu Mar 18 12: 03: 24 2010 (4BA2087C)
92035000 9208f000 afd afd.sys Mon Apr 25 04: 18: 00 2011 (4DB4D9D8)
9208f000 920c1000 netbt netbt.sys Sat Nov 20 09: 39: 22 2010 (4CE7893A)
920c1000 920c8000 wfplwf wfplwf.sys Tue Jul 14 01: 53: 51 2009 (4A5BC90F)
920c8000 920e7000 pacer pacer.sys Tue Jul 14 01: 53: 58 2009 (4A5BC916)
920e7000 920f3000 EpfwLWF EpfwLWF.sys Wed Mar 07 15: 27: 47 2012 (4F577063)
920f3000 92101000 netbios netbios.sys Tue Jul 14 01: 53: 54 2009 (4A5BC912)
92101000 9211b000 serial serial.sys Tue Jul 14 01: 45: 33 2009 (4A5BC71D)
9211b000 9212e000 wanarp wanarp.sys Sat Nov 20 11: 07: 45 2010 (4CE79DF1)
9212e000 9213f000 termdd termdd.sys Sat Nov 20 11: 21: 10 2010 (4CE7A116)
9213f000 92180000 rdbss rdbss.sys Sat Nov 20 09: 42: 44 2010 (4CE78A04)
92180000 9218a000 nsiproxy nsiproxy.sys Tue Jul 14 01: 12: 08 2009 (4A5BBF48)
9218a000 92194000 mssmbios mssmbios.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
92194000 921a0000 discache discache.sys Tue Jul 14 01: 24: 04 2009 (4A5BC214)
921a0000 921d4000 ks ks.sys Sat Nov 20 10: 50: 17 2010 (4CE799D9)
921d4000 921e6000 AgileVpn AgileVpn.sys Tue Jul 14 01: 55: 00 2009 (4A5BC954)
921e6000 921fe000 rasl2tp rasl2tp.sys Tue Jul 14 01: 54: 33 2009 (4A5BC939)
92805000 92869000 csc csc.sys Sat Nov 20 09: 44: 32 2010 (4CE78A70)
92869000 92881000 dfsc dfsc.sys Sat Nov 20 09: 42: 32 2010 (4CE789F8)
92881000 9288f000 blbdrive blbdrive.sys Tue Jul 14 01: 23: 04 2009 (4A5BC1D8)
9288f000 928a1000 intelppm intelppm.sys Tue Jul 14 01: 11: 03 2009 (4A5BBF07)
928a1000 928da000 dxgmms1 dxgmms1.sys Thu Feb 03 04: 45: 05 2011 (4D4A24C1)
928da000 92925000 USBPORT USBPORT.SYS Tue Jul 14 01: 51: 13 2009 (4A5BC871)
92925000 929a4600 ctaud2k ctaud2k.sys Thu Mar 18 12: 04: 11 2010 (4BA208AB)
929a5000 929d4000 portcls portcls.sys Tue Jul 14 01: 51: 00 2009 (4A5BC864)
929d4000 929df000 fdc fdc.sys Tue Jul 14 01: 45: 45 2009 (4A5BC729)
929df000 929e9000 serenum serenum.sys Tue Jul 14 01: 45: 27 2009 (4A5BC717)
929e9000 929f6000 CompositeBus CompositeBus.sys Sat Nov 20 10: 50: 21 2010 (4CE799DD)
93600000 93619000 drmk drmk.sys Tue Jul 14 02: 36: 05 2009 (4A5BD2F5)
93619000 93621000 ctprxy2k ctprxy2k.sys Thu Mar 18 12: 04: 14 2010 (4BA208AE)
93621000 936226c0 ASACPI ASACPI.sys Thu Jul 16 05: 28: 28 2009 (4A5E9E5C)
93623000 93628280 GEARAspiWDM GEARAspiWDM.sys Mon May 18 14: 16: 53 2009 (4A1151B5)
9362b000 9411e000 nvlddmkm nvlddmkm.sys Tue May 15 09: 34: 51 2012 (4FB2071B)
9411e000 941d5000 dxgkrnl dxgkrnl.sys Sat Nov 20 10: 08: 14 2010 (4CE78FFE)
941d5000 941e0000 usbuhci usbuhci.sys Tue Jul 14 01: 51: 10 2009 (4A5BC86E)
941e0000 941ef000 usbehci usbehci.sys Tue Jul 14 01: 51: 14 2009 (4A5BC872)
941ef000 941ff000 L1E62x86 L1E62x86.sys Mon Mar 29 04: 08: 36 2010 (4BB00BA4)
9ba00000 9ba13000 rspndr rspndr.sys Tue Jul 14 01: 53: 20 2009 (4A5BC8F0)
9ba19000 9ba31000 raspppoe raspppoe.sys Tue Jul 14 01: 54: 53 2009 (4A5BC94D)
9ba31000 9ba48000 raspptp raspptp.sys Tue Jul 14 01: 54: 47 2009 (4A5BC947)
9ba48000 9ba5f000 rassstp rassstp.sys Tue Jul 14 01: 54: 57 2009 (4A5BC951)
9ba5f000 9ba6a900 pcouffin pcouffin.sys Tue Dec 05 15: 39: 53 2006 (457584B9)
9ba6b000 9ba75000 rdpbus rdpbus.sys Tue Jul 14 02: 02: 40 2009 (4A5BCB20)
9ba75000 9ba82000 kbdclass kbdclass.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
9ba82000 9ba8f000 mouclass mouclass.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
9ba8f000 9ba90380 swenum swenum.sys Tue Jul 14 01: 45: 08 2009 (4A5BC704)
9ba91000 9babf000 MarvinBus MarvinBus.sys Fri Sep 23 23: 17: 57 2005 (43347105)
9babf000 9bacd000 umbus umbus.sys Sat Nov 20 11: 00: 23 2010 (4CE79C37)
9bacd000 9bb11000 usbhub usbhub.sys Sat Nov 20 11: 00: 34 2010 (4CE79C42)
9bb11000 9bb1b000 flpydisk flpydisk.sys Tue Jul 14 01: 45: 45 2009 (4A5BC729)
9bb1b000 9bb2c000 NDProxy NDProxy.SYS Sat Nov 20 11: 07: 39 2010 (4CE79DEB)
9bb2c000 9bb57000 hap16v2k hap16v2k.sys Thu Mar 18 12: 03: 31 2010 (4BA20883)
9bb57000 9bbf3000 ctac32k ctac32k.sys Thu Mar 18 12: 08: 52 2010 (4BA209C4)
9ca00000 9ca10000 lltdio lltdio.sys Tue Jul 14 01: 53: 18 2009 (4A5BC8EE)
9ca22000 9cb2c000 ha10kx2k ha10kx2k.sys Thu Mar 18 12: 03: 27 2010 (4BA2087F)
9cb2c000 9cb5b000 emupia2k emupia2k.sys Thu Mar 18 12: 03: 13 2010 (4BA20871)
9cb5b000 9cb84000 ctsfm2k ctsfm2k.sys Thu Mar 18 12: 03: 15 2010 (4BA20873)
9cb84000 9cb9f000 COMMONFX COMMONFX.SYS Thu Mar 18 12: 06: 07 2010 (4BA2091F)
9cb9f000 9cbba000 luafv luafv.sys Tue Jul 14 01: 15: 44 2009 (4A5BC020)
9cbba000 9cbd4000 WudfPf WudfPf.sys Sat Nov 20 10: 58: 55 2010 (4CE79BDF)
9cbd4000 9cbfc000 epfw epfw.sys Wed Mar 07 15: 27: 49 2012 (4F577065)
9d400000 9d427980 V0260Vid V0260Vid.sys Sun Apr 02 09: 15: 19 2006 (442F7A07)
9d428000 9d431340 tifsfilt tifsfilt.sys Wed Aug 29 14: 37: 17 2007 (46D5687D)
9d434000 9d4bf000 CTAUDFX CTAUDFX.SYS Thu Mar 18 12: 06: 22 2010 (4BA2092E)
9d4bf000 9d54d000 CTSBLFX CTSBLFX.SYS Thu Mar 18 12: 06: 45 2010 (4BA20945)
9d54d000 9d557000 Dxapi Dxapi.sys Tue Jul 14 01: 25: 25 2009 (4A5BC265)
9d557000 9d564000 crashdmp crashdmp.sys Tue Jul 14 01: 45: 50 2009 (4A5BC72E)
9d564000 9d56f000 dump_ataport dump_ataport.sys Tue Jul 14 01: 11: 16 2009 (4A5BBF14)
9d56f000 9d578000 dump_atapi dump_atapi.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
9d578000 9d589000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 12: 47 2009 (4A5BBF6F)
9d589000 9d5a0000 usbccgp usbccgp.sys Sat Nov 20 11: 00: 08 2010 (4CE79C28)
9d5a0000 9d5a1700 USBD USBD.SYS Tue Jul 14 01: 51: 05 2009 (4A5BC869)
9d5a2000 9d5ad000 hidusb hidusb.sys Sat Nov 20 10: 59: 38 2010 (4CE79C0A)
9d5ad000 9d5c0000 HIDCLASS HIDCLASS.SYS Sat Nov 20 10: 59: 37 2010 (4CE79C09)
9d5c0000 9d5c6480 HIDPARSE HIDPARSE.SYS Tue Jul 14 01: 50: 59 2009 (4A5BC863)
9d5c7000 9d5d2000 mouhid mouhid.sys Tue Jul 14 01: 45: 08 2009 (4A5BC704)
9d5d2000 9d5de000 kbdhid kbdhid.sys Sat Nov 20 10: 50: 10 2010 (4CE799D2)
9d5de000 9d5eb180 STREAM STREAM.SYS Tue Jul 14 01: 50: 57 2009 (4A5BC861)
9d5ec000 9d5f19c0 V0260Cmd V0260Cmd.sys Thu Mar 23 05: 22: 12 2006 (44222274)
9d5f2000 9d5fd000 monitor monitor.sys Tue Jul 14 01: 25: 58 2009 (4A5BC286)
a3c00000 a3c85000 HTTP HTTP.sys Sat Nov 20 09: 40: 17 2010 (4CE78971)
a3c85000 a3c9e000 bowser bowser.sys Wed Feb 23 05: 47: 32 2011 (4D649164)
a3c9e000 a3cb0000 mpsdrv mpsdrv.sys Tue Jul 14 01: 52: 52 2009 (4A5BC8D4)
a3cb0000 a3cd3000 mrxsmb mrxsmb.sys Wed Apr 27 04: 17: 20 2011 (4DB77CB0)
a3cd3000 a3d0e000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 29: 57 2011 (4E17BD25)
a3d0e000 a3d29000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 17: 26 2011 (4DB77CB6)
a3d41000 a3d5b000 idmwfp idmwfp.sys Mon Apr 23 15: 14: 09 2012 (4F9555A1)
a3d5b000 a3df2000 peauth peauth.sys Tue Jul 14 02: 35: 44 2009 (4A5BD2E0)
a3df2000 a3dfc000 secdrv secdrv.SYS Wed Sep 13 15: 18: 32 2006 (45080528)
a402c000 a404d000 srvnet srvnet.sys Fri Apr 29 04: 46: 08 2011 (4DBA2670)
a404d000 a405a000 tcpipreg tcpipreg.sys Sat Nov 20 11: 07: 13 2010 (4CE79DD1)
a405a000 a40aa000 srv2 srv2.sys Fri Apr 29 04: 46: 13 2011 (4DBA2675)
a40aa000 a40fc000 srv srv.sys Fri Apr 29 04: 46: 30 2011 (4DBA2686)
a40fc000 a4126000 fastfat fastfat.SYS Tue Jul 14 01: 14: 01 2009 (4A5BBFB9)
a4126000 a414c340 afcdp afcdp.sys Thu Sep 16 17: 32: 58 2010 (4C9238AA)
a414d000 a4193000 nwifi nwifi.sys Tue Jul 14 01: 51: 59 2009 (4A5BC89F)
a4193000 a41a3000 ndisuio ndisuio.sys Sat Nov 20 11: 06: 36 2010 (4CE79DAC)
a41a3000 a41a6800 mbam mbam.sys Tue Mar 20 17: 04: 50 2012 (4F68AAA2)
Unloaded modules:
a3d29000 a3d41000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00018000
8c811000 8c81e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000D000
8c7f3000 8c7fe000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000B000
8c400000 8c409000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
8c3e3000 8c3f4000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00011000
Bugcheck code 1000000A
Arguments 00000815 000000ff 00000000 832b7849
[CPU Information]
~MHz = REG_DWORD 2533
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ x86 Family 6 Model 23 Stepping 6
ProcessorNameString = REG_SZ Intel(R) Core(TM)2 Duo CPU E7200 @ 2.53GHz
Update Signature = REG_BINARY 0,0,0,0,c,6,0,0
Update Status = REG_DWORD 6
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 60c00000000
Machine ID Information [From Smbios 2.5, DMIVersion 0, Size=2519]
BiosMajorRelease = 22
BiosMinorRelease = 9
BiosVendor = American Megatrends Inc.
BiosVersion = 2209
BiosReleaseDate = 03/11/2010
SystemManufacturer = System manufacturer
SystemProductName = P5Q
SystemFamily = To Be Filled By O.E.M.
SystemVersion = System Version
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASUSTeK Computer INC.
BaseBoardProduct = P5Q
BaseBoardVersion = Rev 1.xx
CPUID: "Intel(R) Core(TM)2 Duo CPU E7200 @ 2.53GHz"
MaxSpeed: 2530
CurrentSpeed: 2533
[SMBIOS Data Tables v2.5]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2519 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version 2209
BIOS Starting Address Segment f000
BIOS Release Date 03/11/2010
BIOS ROM Size 100000
BIOS Characteristics
04: - ISA Supported
07: - PCI Supported
09: - Plug and Play Supported
10: - APM Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
14: - ESCD Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
10: - Specification Reserved
BIOS Major Revision 22
BIOS Minor Revision 9
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer System manufacturer
Product Name P5Q
Version System Version
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To Be Filled By O.E.M.
Family To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASUSTeK Computer INC.
Product P5Q
Version Rev 1.xx
Serial Number
Asset Tag
Feature Flags 09h
1746353524: - ðÂ;
1746353484: - ðÂ;
Location To Be Filled By O.E.M.
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer Chassis Manufacture
Chassis Type Desktop
Version Chassis Version
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 17
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 40 - Handle 0004h]
Socket Designation LGA 775
Processor Type Central Processor
Processor Family bfh - Specification Reserved
Processor Manufacturer Intel
Processor ID 76060100fffbebbf
Processor Version Intel(R) Core(TM)2 Duo CPU E7200 @ 2.53GHz
Processor Voltage 8bh - 1.1V
External Clock 266MHz
Max Speed 3800MHz
Current Speed 2533MHz
Status Enabled Populated
Processor Upgrade Other
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle 0007h
Serial Number
Asset Tag Number
Part Number To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0180h - WB Enabled Int NonSocketed L1
Maximum Cache Size 0040h - 64K
Installed Size 0040h - 64K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type ParitySingle-Bit ECC
System Cache Type Data
Associativity 8-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0181h - WB Enabled Int NonSocketed L2
Maximum Cache Size 0c00h - 3072K
Installed Size 0c00h - 3072K
Supported SRAM Type 0001h - Other
Current SRAM Type 0001h - Other
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity Other
[Cache Information (Type 7) - Length 19 - Handle 0007h]
Socket Designation L3-Cache
Cache Configuration 0302h - Unknown Disabled Int NonSocketed L3
Maximum Cache Size 0000h - 0K
Installed Size 0000h - 0K
Supported SRAM Type 0002h - Unknown
Current SRAM Type 0002h - Unknown
Cache Speed 0ns
Error Correction Type Unknown
System Cache Type Unknown
Associativity Unknown
[Memory Controller Information (Type 5) - Length 24 - Handle 0008h]
Error Detecting Method 06h - 64-bit ECC
Error Correcting Capability 04h - None
Supported Interleave 03h - One Way Interleave
Current Interleave 03h - One Way Interleave
Maximum Memory Module Size 0bh - 2048MB
Supported Speeds 0001h - Other
Supported Memory Types 0100h - DIMM
Memory Module Voltage 3.3V
Number of Memory Slots 4
Memory Slot Handle 0009h
Memory Slot Handle 000ah
Memory Slot Handle 000bh
Memory Slot Handle 000ch
Enabled Err Correcting Caps 04h - None
[Memory Module Information (Type 6) - Length 12 - Handle 0009h]
Socket Designation DIMM0
Bank Connections 01h - 1 0
Current Speed 1ns
Current Memory Type 0100h - DIMM
Installed Size 8ah - 1024 [double bank]
Enabled Size 8ah - 1024 [double bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 000ah]
Socket Designation DIMM1
Bank Connections 23h - 3 2
Current Speed 35ns
Current Memory Type 0100h - DIMM
Installed Size 8ah - 1024 [double bank]
Enabled Size 8ah - 1024 [double bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 000bh]
Socket Designation DIMM2
Bank Connections 45h - 5 4
Current Speed 69ns
Current Memory Type 0100h - DIMM
Installed Size 8ah - 1024 [double bank]
Enabled Size 8ah - 1024 [double bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 000ch]
Socket Designation DIMM3
Bank Connections 67h - 7 6
Current Speed 103ns
Current Memory Type 0100h - DIMM
Installed Size 8ah - 1024 [double bank]
Enabled Size 8ah - 1024 [double bank]
Error Status 00h - [No Errors]
[Onboard Devices Information (Type 10) - Length 6 - Handle 0035h]
Number of Devices 1
01: Type Ethernet [enabled]
01: Description Onboard Ethernet
[OEM Strings (Type 11) - Length 5 - Handle 0036h]
Number of Strings 4
1 0022151D2E4B
2 To Be Filled By O.E.M.
3 To Be Filled By O.E.M.
4 To Be Filled By O.E.M.
[System Configuration Options (Type 12) - Length 5 - Handle 0037h]
[Physical Memory Array (Type 16) - Length 15 - Handle 003ah]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 4194304KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 4
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 003bh]
Starting Address 00000000h
Ending Address 003fffffh
Memory Array Handle 003ah
Partition Width 04
[Memory Device (Type 17) - Length 27 - Handle 003ch]
Physical Memory Array Handle 003ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 1024MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM0
Bank Locator BANK0
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer00
Serial Number
Asset Tag Number
Part Number ModulePartNumber00
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003dh]
Starting Address 00000000h
Ending Address 000fffffh
Memory Device Handle 003ch
Mem Array Mapped Adr Handle 003bh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 003eh]
Physical Memory Array Handle 003ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 1024MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM1
Bank Locator BANK1
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer01
Serial Number
Asset Tag Number
Part Number ModulePartNumber01
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003fh]
Starting Address 00110000h
Ending Address 0020ffffh
Memory Device Handle 003eh
Mem Array Mapped Adr Handle 003bh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0040h]
Physical Memory Array Handle 003ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 1024MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM2
Bank Locator BANK2
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer02
Serial Number
Asset Tag Number
Part Number ModulePartNumber02
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0041h]
Starting Address 00110000h
Ending Address 0020ffffh
Memory Device Handle 0040h
Mem Array Mapped Adr Handle 003bh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
[Memory Device (Type 17) - Length 27 - Handle 0042h]
Physical Memory Array Handle 003ah
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 1024MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM3
Bank Locator BANK3
Memory Type 13h - Specification Reserved
Type Detail 0080h - Synchronous
Speed 800MHz
Manufacturer Manufacturer03
Serial Number
Asset Tag Number
Part Number ModulePartNumber03
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0043h]
Starting Address 00110000h
Ending Address 0020ffffh
Memory Device Handle 0042h
Mem Array Mapped Adr Handle 003bh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth 01
Następny
0x00000116
Moduł systemu TDR (Timeout Detection Recovery) próbuje zresetować działanie zarówno sterowników jak i samego układu graficznego. Bsody te powstają wtedy kiedy moduł ten w przeciągu zadanej ilości prób nie jest w stanie zmusić grafiki do powrotu z timeout'u (braku odpowiedzi).
Dość dokładnie opisane
http://forums.nvidia.com/index.php?showtopic=65161
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\12\081912-21840-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
Machine Name:
Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b804d0
Debug session time: Sun Aug 19 19: 35: 51.735 2012 (UTC + 2: 00)
System Uptime: 0 days 2: 33: 59.202
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
........
1: kd> !analyze -v;r;kv;lmtn;.bugcheck
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: 87797208, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: 92f51ed8, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 00000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 00000002, Optional internal context dependent data.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
FAULTING_IP:
nvlddmkm+13eed8
92f51ed8 55 push ebp
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
8f9b0ba4 9399307b 00000116 87797208 92f51ed8 nt!KeBugCheckEx+0x1e
8f9b0bc8 93987937 92f51ed8 00000000 00000002 dxgkrnl!TdrBugcheckOnTimeout+0x8d
8f9b0bec 939c392c 00000000 00000000 8f9b0cb0 dxgkrnl!TdrIsRecoveryRequired+0xb8
8f9b0c64 939eac1d fffffcfb 000908ed 00000000 dxgmms1!VidSchiReportHwHang+0x3c0
8f9b0c90 939ca993 8769d788 8f9b0cb0 00000102 dxgmms1!VidSchWaitForCompletionEvent+0x16f
8f9b0d28 939ef3c9 00000002 82a6e539 8769d788 dxgmms1!VidSchiScheduleCommandToRun+0x14d
8f9b0d3c 939ef485 8769d788 00000000 876be948 dxgmms1!VidSchiRun_PriorityTable+0xf
8f9b0d50 82c40056 8769d788 a274ae8b 00000000 dxgmms1!VidSchiWorkerThread+0x7f
8f9b0d90 82ae81a9 939ef406 8769d788 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nvlddmkm+13eed8
92f51ed8 55 push ebp
SYMBOL_NAME: nvlddmkm+13eed8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4fb2071b
FAILURE_BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys
BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys
Followup: MachineOwner
---------
Trzeci - potwierdzenie diagnozy pierwszego bsod'a
http://msdn.microsoft.com/en-us/library/...v=vs.85%29
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\12\081912-17596-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
Machine Name:
Kernel base = 0x82a03000 PsLoadedModuleList = 0x82b4c4d0
Debug session time: Sun Aug 19 16: 51: 47.381 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 07: 46.973
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 92b38b43, 9403bc44, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 92b38b43, The address that the exception occurred at
Arg3: 9403bc44, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
dxgkrnl!DxgkWaitForVerticalBlankEvent+2cd
92b38b43 af scas dword ptr es: [edi]
TRAP_FRAME: 9403bc44 -- (.trap 0xffffffff9403bc44)
ErrCode = 00000000
eax=8772a008 ebx=00000000 ecx=8631f788 edx=00000001 esi=870fc000 edi=00000011
eip=92b38b43 esp=9403bcb8 ebp=9403bd28 iopl=0 nv up ei pl nz na po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010203
dxgkrnl!DxgkWaitForVerticalBlankEvent+0x2cd:
92b38b43 af scas dword ptr es: [edi] es: 0023: 00000011=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x8E
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82a4127a to 92b38b43
STACK_TEXT:
9403bd28 82a4127a 00d4fbe0 00d4fbf4 77b77094 dxgkrnl!DxgkWaitForVerticalBlankEvent+0x2cd
9403bd28 77b77094 00d4fbe0 00d4fbf4 77b77094 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
00d4fbf4 00000000 00000000 00000000 00000000 0x77b77094
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgkrnl
8 errors : !dxgkrnl (92b38b42-92b38b7a)
92b38b40 50 51 *42 af 1b fe ff 84 c0 75 *69 8d 4d ac e8 42 PQB......ui.M..B
92b38b50 0f fe *6c 8d 4d cc e8 43 08 fe *62 f6 05 20 26 b3 ..l.M..C..b.. &.
92b38b60 92 02 *65 0c 6a 02 68 ea 07 00 *74 e8 b6 f5 fe ff ..e.j.h...t.....
92b38b70 33 c0 *6a 97 01 00 00 8d be 38 *20 00 00 8b c7 33 3.j......8 ....3
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------