Wątek zamknięty

[W koszu] Częste Bluescreeny

 
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #5

RE: Częste Bluescreeny


Cytat:Też miałęm takie problemy . mi pomogło sciagniecie sterowników ze strony producenta ,moze i Tobie by pomogło .

Idź do lekarza niech na ból głowy wykona operację serca bo sąsiadowi tak pomogło. Mniej więcej tak można podsumować Twą nic nie wnoszącą odpowiedź gdyż każdy przypadek trzeba rozpatrywać indywidualnie. Nie ma uniwersalnego rozwiązania.

Cytat:Wszędzie piszą ,że jest to problem związany z kartą graficzną

Nikt nie widział, nie zdebugował bsodów a już odpowiedź mają. Same zdolne wróżki na tych forach siedzą.

Dla mnie częścią wspólną wszystkich 3 bsodów jest Hamachi i Eset.

W tych linkach jest wytłumaczona istota pojawiania się tych kodów błędów w zrzutach mindump

http://mikemstech.blogspot.com/2011/12/t...-0x3b.html
http://mikemstech.blogspot.com/2012/01/t...rrupt.html
http://blogs.msdn.com/b/ntdebugging/arch...flows.aspx
http://windows7forum.pl/bsod-bledy-w-nie...e-35818-t?



Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c: \Users\user\SysnativeBSODApps\022614-25443-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`034a56d0
Debug session time:  Wed Feb 26 18: 04: 25.186 2014 (UTC + 1: 00)
System Uptime:  0 days 1: 02: 14.732
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800032cfac5, fffff8800a700cd0, 0}

Probably caused by :  ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup:  MachineOwner
---------

0:  kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:  
Arg1:  00000000c0000005, Exception code that caused the bugcheck
Arg2:  fffff800032cfac5, Address of the instruction which caused the bugcheck
Arg3:  fffff8800a700cd0, Address of the context record for the exception that caused the bugcheck
Arg4:  0000000000000000, zero.

Debugging Details:  
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`032cfac5 498b08          mov     rcx,qword ptr [r8]

CONTEXT:   fffff8800a700cd0 -- (.cxr 0xfffff8800a700cd0)
.cxr 0xfffff8800a700cd0
rax=000000098e680019 rbx=0000000000000000 rcx=fffff8800162f3c0
rdx=fa80063a7330a881 rsi=fffff8800a701710 rdi=fffff8800162f3c0
rip=fffff800032cfac5 rsp=fffff8800a7016b0 rbp=fffffa8007209e20
r8=fa80063a7330a880  r9=fffffa8003aca880 r10=fffff8800162f3c0
r11=fffff8800a7017c8 r12=fffffa8003aca880 r13=fffffa8003aca880
r14=0000000000000000 r15=fffffa8003aca880
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!ExpInterlockedPopEntrySListFault16:  
fffff800`032cfac5 498b08          mov     rcx,qword ptr [r8] ds: 002b: fa80063a`7330a880=?
.cxr
Resetting default scope

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x3B

PROCESS_NAME:   ekrn.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff800032cfac5

STACK_TEXT:    
fffff880`0a7016b0 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!ExpInterlockedPopEntrySListFault16


FOLLOWUP_IP:  
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`032cfac5 498b08          mov     rcx,qword ptr [r8]

SYMBOL_STACK_INDEX:   0

SYMBOL_NAME:   nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

IMAGE_NAME:   ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:   521ea035

STACK_COMMAND:   .cxr 0xfffff8800a700cd0 ; kb

FAILURE_BUCKET_ID:   X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:   X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

Followup:  MachineOwner
---------


Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03254000 PsLoadedModuleList = 0xfffff800`034976d0
Debug session time:  Mon Mar  3 23: 02: 41.101 2014 (UTC + 1: 00)
System Uptime:  0 days 0: 54: 40.646
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 4E, {7, 309de, 1, 0}

Probably caused by :  dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31 )

Followup:  MachineOwner
---------

3:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie:  calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:  
Arg1:  0000000000000007, A driver has unlocked a page more times than it locked it
Arg2:  00000000000309de, page frame number
Arg3:  0000000000000001, current share count
Arg4:  0000000000000000, 0

Debugging Details:  
------------------


BUGCHECK_STR:   0x4E_7

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

PROCESS_NAME:   System

CURRENT_IRQL:   2

LAST_CONTROL_TRANSFER:   from fffff80003291a83 to fffff800032c9bc0

STACK_TEXT:    
fffff880`07df6728 fffff800`03291a83 :  00000000`0000004e 00000000`00000007 00000000`000309de 00000000`00000001 :  nt!KeBugCheckEx
fffff880`07df6730 fffff800`0333c456 :  00000000`00000000 00000000`00000300 fffffa80`0633a000 fffff880`045a4b56 :  nt! ? : FNODOBFM: `string'+0x165e6
fffff880`07df6770 fffff880`045b5051 :  00000000`00000082 00000000`00000000 00000000`00000000 00000000`00000000 :  nt! ? : FNODOBFM: `string'+0x368d5
fffff880`07df6800 fffff880`045af317 :  fffff8a0`0c4f5010 fffff8a0`0c4f5010 fffffa80`06343d30 fffff8a0`0c4f5010 :  dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+0x31
fffff880`07df6830 fffff880`045aeed8 :  fffffa80`06343d30 fffff8a0`0c4f5010 fffff8a0`0c4f5010 00000000`00000000 :  dxgmms1!VIDMM_APERTURE_SEGMENT: UnlockAllocationRange+0x10f
fffff880`07df6890 fffff880`045a28a4 :  fffffa80`0633a000 fffffa80`0633a000 fffffa80`0633ac80 fffffa80`0633a000 :  dxgmms1!VIDMM_APERTURE_SEGMENT: ReleaseTemporaryResource+0xdc
fffff880`07df68d0 fffff880`0459f257 :  00000000`00000000 00000000`00000000 00000000`0000009a fffffa80`0633a000 :  dxgmms1!VIDMM_GLOBAL: EvictTemporaryAllocations+0xbc
fffff880`07df6910 fffff880`045b97d9 :  00000000`00000000 fffff8a0`0c613b20 fffffa80`00000000 fffffa80`03fe40d0 :  dxgmms1!VIDMM_GLOBAL: PrepareDmaBuffer+0x69f
fffff880`07df6ae0 fffff880`045b9514 :  fffff800`0494d080 fffff880`045b8f00 fffffa80`00000000 fffffa80`00000000 :  dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`07df6cd0 fffff880`045b9012 :  00000000`00000000 fffffa80`04a18560 00000000`00000080 fffffa80`06250410 :  dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`07df6d00 fffff800`035662ea :  00000000`03c060ee fffffa80`0602fb50 fffffa80`039f5040 fffffa80`0602fb50 :  dxgmms1!VidSchiWorkerThread+0xd6
fffff880`07df6d40 fffff800`032ba8e6 :  fffff800`03444e80 fffffa80`0602fb50 fffff800`03452cc0 00000000`c287a000 :  nt!PspSystemThreadStartup+0x5a
fffff880`07df6d80 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiStartSystemThread+0x16


STACK_COMMAND:   kb

FOLLOWUP_IP:  
dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31
fffff880`045b5051 4c8b1d60d0fdff  mov     r11,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`045920b8)]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  dxgmms1

IMAGE_NAME:   dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   5164dc13

FAILURE_BUCKET_ID:   X64_0x4E_7_dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31

BUCKET_ID:   X64_0x4E_7_dxgmms1!VIDMM_SEGMENT: SafeUnlockPages+31

Followup:  MachineOwner
---------

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:  
Kernel base = 0xfffff800`03212000 PsLoadedModuleList = 0xfffff800`034556d0
Debug session time:  Mon Mar  3 22: 07: 28.361 2014 (UTC + 1: 00)
System Uptime:  0 days 0: 24: 31.517
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800033bcb05, fffff8800b948d50, 0}

Probably caused by :  Pool_Corruption ( nt!ExDeferredFreePool+249 )

Followup:  Pool_corruption
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:  
Arg1:  00000000c0000005, Exception code that caused the bugcheck
Arg2:  fffff800033bcb05, Address of the instruction which caused the bugcheck
Arg3:  fffff8800b948d50, Address of the context record for the exception that caused the bugcheck
Arg4:  0000000000000000, zero.

Debugging Details:  
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
nt!ExDeferredFreePool+249
fffff800`033bcb05 4c395808        cmp     qword ptr [rax+8],r11

CONTEXT:   fffff8800b948d50 -- (.cxr 0xfffff8800b948d50)
.cxr 0xfffff8800b948d50
rax=3930fffffa800000 rbx=0000000000000005 rcx=fffffa8003965a40
rdx=fffff8a00c87e002 rsi=0000000000000000 rdi=fffff8a00bdc86b0
rip=fffff800033bcb05 rsp=fffff8800b949730 rbp=0000000000000000
r8=0001fffff8a00d08  r9=fffff8a00c87e412 r10=0000000000000001
r11=fffff8a00c87e422 r12=fffffa8003965500 r13=0000000000000000
r14=0000000000000012 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!ExDeferredFreePool+0x249:  
fffff800`033bcb05 4c395808        cmp     qword ptr [rax+8],r11 ds: 002b: 3930ffff`fa800008=?
.cxr
Resetting default scope

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x3B

PROCESS_NAME:   chrome.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff800033bcb05

STACK_TEXT:    
fffff880`0b949730 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!ExDeferredFreePool+0x249


FOLLOWUP_IP:  
nt!ExDeferredFreePool+249
fffff800`033bcb05 4c395808        cmp     qword ptr [rax+8],r11

SYMBOL_STACK_INDEX:   0

SYMBOL_NAME:   nt!ExDeferredFreePool+249

FOLLOWUP_NAME:   Pool_corruption

IMAGE_NAME:   Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:   0

MODULE_NAME:  Pool_Corruption

STACK_COMMAND:   .cxr 0xfffff8800b948d50 ; kb

FAILURE_BUCKET_ID:   X64_0x3B_nt!ExDeferredFreePool+249

BUCKET_ID:   X64_0x3B_nt!ExDeferredFreePool+249

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.

04.03.2014 22:18

Róża Podziękowania od: Aldanon
Znajdź wszystkie posty użytkownika
Wątek zamknięty


Wiadomości w tym wątku
Częste Bluescreeny - Aldanon - 03.03.2014, 23:40
RE: Częste Bluescreeny - irocket - 04.03.2014, 08:00
RE: Częste Bluescreeny - Yordan - 04.03.2014, 10:48
RE: Częste Bluescreeny - Aldanon - 04.03.2014, 17:14
RE: Częste Bluescreeny - thermalfake - 04.03.2014 22:18
RE: Częste Bluescreeny - Aldanon - 05.03.2014, 19:08
RE: Częste Bluescreeny - irocket - 05.03.2014, 19:19
RE: Częste Bluescreeny - Aldanon - 05.03.2014, 21:20
Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
W koszu Ciągłe bluescreeny cały czas z innymi kodami błedu. doman964 9 1.446 17.10.2016 16:42
Ostatni post: doman964
W koszu Bluescreeny podczas gry. jacekm460 0 361 10.03.2015 16:15
Ostatni post: jacekm460
W koszu Problem - Częste BSOD'y jacekm460 0 428 10.03.2015 13:03
Ostatni post: jacekm460
W koszu Bardzo częste blue screeny Gromek9979 0 396 06.09.2014 22:29
Ostatni post: Gromek9979
W koszu Bardzo częste bluescreeny rycerz22 1 603 05.09.2014 18:01
Ostatni post: rycerz22
Częste bluescreeny Ciarkol 5 675 07.01.2013 15:23
Ostatni post: peciaq
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.