thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Częste Bluescreeny
Cytat:Też miałęm takie problemy . mi pomogło sciagniecie sterowników ze strony producenta ,moze i Tobie by pomogło .
Idź do lekarza niech na ból głowy wykona operację serca bo sąsiadowi tak pomogło. Mniej więcej tak można podsumować Twą nic nie wnoszącą odpowiedź gdyż każdy przypadek trzeba rozpatrywać indywidualnie. Nie ma uniwersalnego rozwiązania.
Cytat:Wszędzie piszą ,że jest to problem związany z kartą graficzną
Nikt nie widział, nie zdebugował bsodów a już odpowiedź mają. Same zdolne wróżki na tych forach siedzą.
Dla mnie częścią wspólną wszystkich 3 bsodów jest Hamachi i Eset.
W tych linkach jest wytłumaczona istota pojawiania się tych kodów błędów w zrzutach mindump
http://mikemstech.blogspot.com/2011/12/t...-0x3b.html
http://mikemstech.blogspot.com/2012/01/t...rrupt.html
http://blogs.msdn.com/b/ntdebugging/arch...flows.aspx
http://windows7forum.pl/bsod-bledy-w-nie...e-35818-t?
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c: \Users\user\SysnativeBSODApps\022614-25443-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`034a56d0
Debug session time: Wed Feb 26 18: 04: 25.186 2014 (UTC + 1: 00)
System Uptime: 0 days 1: 02: 14.732
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800032cfac5, fffff8800a700cd0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )
Followup: MachineOwner
---------
0: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800032cfac5, Address of the instruction which caused the bugcheck
Arg3: fffff8800a700cd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`032cfac5 498b08 mov rcx,qword ptr [r8]
CONTEXT: fffff8800a700cd0 -- (.cxr 0xfffff8800a700cd0)
.cxr 0xfffff8800a700cd0
rax=000000098e680019 rbx=0000000000000000 rcx=fffff8800162f3c0
rdx=fa80063a7330a881 rsi=fffff8800a701710 rdi=fffff8800162f3c0
rip=fffff800032cfac5 rsp=fffff8800a7016b0 rbp=fffffa8007209e20
r8=fa80063a7330a880 r9=fffffa8003aca880 r10=fffff8800162f3c0
r11=fffff8800a7017c8 r12=fffffa8003aca880 r13=fffffa8003aca880
r14=0000000000000000 r15=fffffa8003aca880
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExpInterlockedPopEntrySListFault16:
fffff800`032cfac5 498b08 mov rcx,qword ptr [r8] ds: 002b: fa80063a`7330a880=?
.cxr
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800032cfac5
STACK_TEXT:
fffff880`0a7016b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16
FOLLOWUP_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`032cfac5 498b08 mov rcx,qword ptr [r8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpInterlockedPopEntrySListFault16+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
STACK_COMMAND: .cxr 0xfffff8800a700cd0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0
BUCKET_ID: X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03254000 PsLoadedModuleList = 0xfffff800`034976d0
Debug session time: Mon Mar 3 23: 02: 41.101 2014 (UTC + 1: 00)
System Uptime: 0 days 0: 54: 40.646
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {7, 309de, 1, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000000309de, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80003291a83 to fffff800032c9bc0
STACK_TEXT:
fffff880`07df6728 fffff800`03291a83 : 00000000`0000004e 00000000`00000007 00000000`000309de 00000000`00000001 : nt!KeBugCheckEx
fffff880`07df6730 fffff800`0333c456 : 00000000`00000000 00000000`00000300 fffffa80`0633a000 fffff880`045a4b56 : nt! ? : FNODOBFM: `string'+0x165e6
fffff880`07df6770 fffff880`045b5051 : 00000000`00000082 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ? : FNODOBFM: `string'+0x368d5
fffff880`07df6800 fffff880`045af317 : fffff8a0`0c4f5010 fffff8a0`0c4f5010 fffffa80`06343d30 fffff8a0`0c4f5010 : dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+0x31
fffff880`07df6830 fffff880`045aeed8 : fffffa80`06343d30 fffff8a0`0c4f5010 fffff8a0`0c4f5010 00000000`00000000 : dxgmms1!VIDMM_APERTURE_SEGMENT: UnlockAllocationRange+0x10f
fffff880`07df6890 fffff880`045a28a4 : fffffa80`0633a000 fffffa80`0633a000 fffffa80`0633ac80 fffffa80`0633a000 : dxgmms1!VIDMM_APERTURE_SEGMENT: ReleaseTemporaryResource+0xdc
fffff880`07df68d0 fffff880`0459f257 : 00000000`00000000 00000000`00000000 00000000`0000009a fffffa80`0633a000 : dxgmms1!VIDMM_GLOBAL: EvictTemporaryAllocations+0xbc
fffff880`07df6910 fffff880`045b97d9 : 00000000`00000000 fffff8a0`0c613b20 fffffa80`00000000 fffffa80`03fe40d0 : dxgmms1!VIDMM_GLOBAL: PrepareDmaBuffer+0x69f
fffff880`07df6ae0 fffff880`045b9514 : fffff800`0494d080 fffff880`045b8f00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`07df6cd0 fffff880`045b9012 : 00000000`00000000 fffffa80`04a18560 00000000`00000080 fffffa80`06250410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`07df6d00 fffff800`035662ea : 00000000`03c060ee fffffa80`0602fb50 fffffa80`039f5040 fffffa80`0602fb50 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`07df6d40 fffff800`032ba8e6 : fffff800`03444e80 fffffa80`0602fb50 fffff800`03452cc0 00000000`c287a000 : nt!PspSystemThreadStartup+0x5a
fffff880`07df6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31
fffff880`045b5051 4c8b1d60d0fdff mov r11,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`045920b8)]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5164dc13
FAILURE_BUCKET_ID: X64_0x4E_7_dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31
BUCKET_ID: X64_0x4E_7_dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03212000 PsLoadedModuleList = 0xfffff800`034556d0
Debug session time: Mon Mar 3 22: 07: 28.361 2014 (UTC + 1: 00)
System Uptime: 0 days 0: 24: 31.517
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800033bcb05, fffff8800b948d50, 0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+249 )
Followup: Pool_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800033bcb05, Address of the instruction which caused the bugcheck
Arg3: fffff8800b948d50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
nt!ExDeferredFreePool+249
fffff800`033bcb05 4c395808 cmp qword ptr [rax+8],r11
CONTEXT: fffff8800b948d50 -- (.cxr 0xfffff8800b948d50)
.cxr 0xfffff8800b948d50
rax=3930fffffa800000 rbx=0000000000000005 rcx=fffffa8003965a40
rdx=fffff8a00c87e002 rsi=0000000000000000 rdi=fffff8a00bdc86b0
rip=fffff800033bcb05 rsp=fffff8800b949730 rbp=0000000000000000
r8=0001fffff8a00d08 r9=fffff8a00c87e412 r10=0000000000000001
r11=fffff8a00c87e422 r12=fffffa8003965500 r13=0000000000000000
r14=0000000000000012 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExDeferredFreePool+0x249:
fffff800`033bcb05 4c395808 cmp qword ptr [rax+8],r11 ds: 002b: 3930ffff`fa800008=?
.cxr
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800033bcb05
STACK_TEXT:
fffff880`0b949730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x249
FOLLOWUP_IP:
nt!ExDeferredFreePool+249
fffff800`033bcb05 4c395808 cmp qword ptr [rax+8],r11
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+249
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff8800b948d50 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+249
BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+249
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
|