thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Problem z bluescreenami od niedawna w moim Windows 7
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`02e08000 PsLoadedModuleList = 0xfffff800`0304b890
Debug session time: Tue Jan 6 10: 13: 18.704 2015 (UTC + 1: 00)
System Uptime: 0 days 0: 44: 50.530
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff800830b5c40, 2, 0, fffff80002e7368d}
Probably caused by : ntkrnlmp.exe ( nt!KiCommitThreadWait+26d )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800830b5c40, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e7368d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
fffff800830b5c40
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiCommitThreadWait+26d
fffff800`02e7368d 4d8bb4c040dc2a00 mov r14,qword ptr [r8+rax*8+2ADC40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800838e7b0 -- (.trap 0xfffff8800838e7b0)
.trap 0xfffff8800838e7b0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000010000000 rbx=0000000000000000 rcx=0000000000000032
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e7368d rsp=fffff8800838e940 rbp=0000000000000000
r8=fffff80002e08000 r9=0000000000000000 r10=fffffffffffffffe
r11=fffff80002ff8e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiCommitThreadWait+0x26d:
fffff800`02e7368d 4d8bb4c040dc2a00 mov r14,qword ptr [r8+rax*8+2ADC40h] ds: fffff800`830b5c40=??
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7d169 to fffff80002e7dbc0
STACK_TEXT:
fffff880`0838e668 fffff800`02e7d169 : 00000000`0000000a fffff800`830b5c40 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0838e670 fffff800`02e7bde0 : 00000000`00000200 fffff800`02e80e53 fffffa80`00000000 fffffa80`01ef7620 : nt!KiBugCheckDispatch+0x69
fffff880`0838e7b0 fffff800`02e7368d : fffffa80`01ef7620 fffffa80`01ef7620 00000000`00000000 fffffa80`00000008 : nt!KiPageFault+0x260
fffff880`0838e940 fffff800`02e851e3 : 00000000`00000002 fffffa80`03e87ef0 00000000`00000032 00000000`00000000 : nt!KiCommitThreadWait+0x26d
fffff880`0838e9d0 fffff800`03166837 : fffffa80`00000000 fffffa80`03e87e01 00000000`00000001 fffffa80`03e87ef0 : nt!KeRemoveQueueEx+0x323
fffff880`0838ea90 fffff800`02e68e06 : fffffa80`00000000 fffff880`0838eba8 fffff880`0838ebc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`0838eb20 fffff800`02e7ce53 : fffffa80`01ef7620 00000000`775745c0 fffff880`0838eca0 00000000`0037fea0 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`0838ec20 00000000`774c2bba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03dff908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774c2bba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiCommitThreadWait+26d
fffff800`02e7368d 4d8bb4c040dc2a00 mov r14,qword ptr [r8+rax*8+2ADC40h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiCommitThreadWait+26d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 531590fb
FAILURE_BUCKET_ID: X64_0xA_nt!KiCommitThreadWait+26d
BUCKET_ID: X64_0xA_nt!KiCommitThreadWait+26d
Followup: MachineOwner
---------
start end module name
fffff880`00f97000 fffff880`00fee000 ACPI ACPI.sys Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`03acd000 fffff880`03b56000 afd afd.sys Fri May 30 08: 45: 48 2014 (5388291C)
fffff880`0fdc7000 fffff880`0fddd000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`00def000 fffff880`00dfa000 amdxata amdxata.sys Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`00c86000 fffff880`00c8f000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00dc5000 fffff880`00def000 ataport ataport.SYS Mon Aug 05 03: 02: 45 2013 (51FEF9B5)
fffff960`00950000 fffff960`009b1000 ATMFD ATMFD.DLL Thu Jun 06 05: 30: 53 2013 (51B0026D)
fffff880`01996000 fffff880`0199d000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`06761000 fffff880`06772000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`054ef000 fffff880`0550d000 bowser bowser.sys Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff960`007d0000 fffff960`007f7000 cdd cdd.dll unavailable (00000000)
fffff880`0861f000 fffff880`0863c000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`01963000 fffff880`0198d000 cdrom cdrom.sys Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`00ed7000 fffff880`00f97000 CI CI.dll Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`018b4000 fffff880`018e4000 CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`00cf3000 fffff880`00d51000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01072000 cng cng.sys Wed Aug 01 17: 48: 07 2012 (50194FB7)
fffff880`0fdb7000 fffff880`0fdc7000 CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`06ebf000 fffff880`06ecd000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`066c0000 fffff880`06743000 csc csc.sys Sat Nov 20 10: 27: 12 2010 (4CE79470)
fffff880`06743000 fffff880`06761000 dfsc dfsc.sys Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`03a97000 fffff880`03aa6000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`0189e000 fffff880`018b4000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`0663d000 fffff880`0665f000 drmk drmk.sys Fri Oct 04 04: 16: 30 2013 (524E24FE)
fffff880`0191a000 fffff880`01963000 dtsoftbus01 dtsoftbus01.sys Fri Jan 13 14: 45: 46 2012 (4F10358A)
fffff880`06ed9000 fffff880`06ee2000 dump_atapi dump_atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`06ecd000 fffff880`06ed9000 dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`06ee2000 fffff880`06ef5000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`06e2e000 fffff880`06e3a000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`068e3000 fffff880`069d8000 dxgkrnl dxgkrnl.sys Mon Jun 16 02: 58: 04 2014 (539E411C)
fffff880`06800000 fffff880`06846000 dxgmms1 dxgmms1.sys Wed Apr 10 05: 27: 15 2013 (5164DC13)
fffff880`068bb000 fffff880`068c8000 fdc fdc.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`0114b000 fffff880`0115f000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`067f1000 fffff880`067fc000 flpydisk flpydisk.sys Tue Jul 14 02: 00: 54 2009 (4A5BCAB6)
fffff880`010ff000 fffff880`0114b000 fltmgr fltmgr.sys Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01864000 fffff880`0189e000 fvevol fvevol.sys Thu Jan 24 04: 11: 24 2013 (5100A65C)
fffff880`0148c000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Sat Apr 05 03: 23: 21 2014 (533F5B09)
fffff800`033ed000 fffff800`03436000 hal hal.dll Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`06846000 fffff880`0686a000 HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`06e67000 fffff880`06e80000 HIDCLASS HIDCLASS.SYS Wed Jul 03 06: 05: 05 2013 (51D3A2F1)
fffff880`06e80000 fffff880`06e88080 HIDPARSE HIDPARSE.SYS Wed Jul 03 06: 05: 04 2013 (51D3A2F0)
fffff880`06e59000 fffff880`06e67000 hidusb hidusb.sys Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`05426000 fffff880`054ef000 HTTP HTTP.sys Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`015f6000 fffff880`015ff000 hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`00ff7000 fffff880`00fff000 intelide intelide.sys Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`06798000 fffff880`067ae000 intelppm intelppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`0f0a9000 fffff880`0f0b8000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06e89000 fffff880`06e97000 kbdhid kbdhid.sys Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff800`00ba2000 fffff800`00bac000 kdcom kdcom.dll Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff880`067ae000 fffff880`067f1000 ks ks.sys Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`01200000 fffff880`0121b000 ksecdd ksecdd.sys Sat Apr 12 03: 08: 30 2014 (5348920E)
fffff880`01460000 fffff880`0148c000 ksecpkg ksecpkg.sys Tue Oct 14 03: 08: 32 2014 (543C7790)
fffff880`0f0c7000 fffff880`0f0cc200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`06f26000 fffff880`06f3b000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`06f03000 fffff880`06f26000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`00c90000 fffff880`00cdf000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Sat Nov 20 14: 03: 51 2010 (4CE7C737)
fffff880`06ef5000 fffff880`06f03000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`0f0b8000 fffff880`0f0c7000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`06eb2000 fffff880`06ebf000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000 mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`0115f000 fffff880`011a1000 MpFilter MpFilter.sys Thu Jul 10 04: 43: 06 2014 (53BDFDBA)
fffff880`0550d000 fffff880`05525000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`05525000 fffff880`05552000 mrxsmb mrxsmb.sys Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`05552000 fffff880`055a0000 mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`055a0000 fffff880`055c4000 mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`01800000 fffff880`0180b000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00d51000 fffff880`00d5b000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`011a1000 fffff880`011ff000 msrpc msrpc.sys Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`03a8c000 fffff880`03a97000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`015e4000 fffff880`015f6000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`014f2000 fffff880`015e4000 ndis ndis.sys Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`068d4000 fffff880`068e0000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`0f024000 fffff880`0f053000 ndiswan ndiswan.sys Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`03aa6000 fffff880`03abb000 NDProxy NDProxy.SYS Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`03bca000 fffff880`03bd9000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`03b56000 fffff880`03b9b000 netbt netbt.sys Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Tue Nov 26 11: 21: 01 2013 (5294760D)
fffff880`08600000 fffff880`0861f000 NisDrvWFP NisDrvWFP.sys Thu Jul 10 04: 43: 47 2014 (53BDFDE3)
fffff880`0180b000 fffff880`0181c000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`03a80000 fffff880`03a8c000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff800`02e08000 fffff800`033ed000 nt ntkrnlmp.exe Tue Mar 04 09: 38: 19 2014 (531590FB)
fffff880`0123f000 fffff880`013e8000 Ntfs Ntfs.sys Fri Jan 24 02: 14: 50 2014 (52E1BE8A)
fffff880`0198d000 fffff880`01996000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`0f0d3000 fffff880`0fd61000 nvlddmkm nvlddmkm.sys Wed Jul 02 19: 42: 02 2014 (53B4446A)
fffff880`087e8000 fffff880`087f2000 NvStreamKms NvStreamKms.sys Sat Sep 06 06: 37: 11 2014 (540A8F77)
fffff880`0fdef000 fffff880`0fdfc000 nvvad64v nvvad64v.sys Thu Sep 04 19: 10: 48 2014 (54089D18)
fffff880`03ba4000 fffff880`03bca000 pacer pacer.sys Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`069d8000 fffff880`069f5000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`00d9b000 fffff880`00db0000 partmgr partmgr.sys Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00d5b000 fffff880`00d8e000 pci pci.sys Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00c5c000 fffff880`00c6c000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`06f53000 fffff880`06ff9000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`06600000 fffff880`0663d000 portcls portcls.sys Fri Oct 04 03: 36: 02 2013 (524E1B82)
fffff880`00cdf000 fffff880`00cf3000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`0f000000 fffff880`0f024000 rasl2tp rasl2tp.sys Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`0f053000 fffff880`0f06e000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0f06e000 fffff880`0f08f000 raspptp raspptp.sys Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`0f08f000 fffff880`0f0a9000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`03a2f000 fffff880`03a80000 rdbss rdbss.sys Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`069f5000 fffff880`06a00000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`019e0000 fffff880`019e9000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019e9000 fffff880`019f2000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`019f2000 fffff880`019fb000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`010be000 fffff880`010f8000 rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`06f3b000 fffff880`06f53000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`0686a000 fffff880`0689c000 Rt64win7 Rt64win7.sys Thu Feb 26 10: 04: 13 2009 (49A65B0D)
fffff880`06a1f000 fffff880`06e2de00 RTKVHD64 RTKVHD64.sys Tue Oct 28 11: 32: 13 2014 (544F70AD)
fffff880`055e3000 fffff880`055ee000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`068c8000 fffff880`068d4000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`03bd9000 fffff880`03bf6000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`014e5000 fffff880`014ed000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`086cb000 fffff880`08763000 srv srv.sys Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`08662000 fffff880`086cb000 srv2 srv2.sys Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`018e4000 fffff880`01915000 srvnet srvnet.sys Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`068e0000 fffff880`068e1480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`01601000 fffff880`01800000 tcpip tcpip.sys Sat Apr 05 03: 26: 44 2014 (533F5BD4)
fffff880`055ee000 fffff880`05600000 tcpipreg tcpipreg.sys Wed Oct 03 18: 07: 26 2012 (506C62BE)
fffff880`0183e000 fffff880`0184b000 TDI TDI.SYS Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`0181c000 fffff880`0183e000 tdx tdx.sys Tue Nov 11 02: 46: 26 2014 (54616A72)
fffff880`03a1b000 fffff880`03a2f000 termdd termdd.sys Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff960`00400000 fffff960`0040a000 TSDDD TSDDD.dll unavailable (00000000)
fffff880`06772000 fffff880`06798000 tunnel tunnel.sys Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`0fddd000 fffff880`0fdef000 umbus umbus.sys Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`06e3a000 fffff880`06e57000 usbccgp usbccgp.sys Wed Nov 27 02: 41: 15 2013 (52954DBB)
fffff880`06e57000 fffff880`06e58e80 USBD USBD.SYS Wed Nov 27 02: 41: 03 2013 (52954DAF)
fffff880`068a9000 fffff880`068bb000 usbehci usbehci.sys Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`0665f000 fffff880`066b9000 usbhub usbhub.sys Wed Nov 27 02: 41: 36 2013 (52954DD0)
fffff880`0fd61000 fffff880`0fdb7000 USBPORT USBPORT.SYS Wed Nov 27 02: 41: 11 2013 (52954DB7)
fffff880`06e97000 fffff880`06eb2000 USBSTOR USBSTOR.SYS Fri Mar 11 05: 37: 16 2011 (4D79A6FC)
fffff880`0689c000 fffff880`068a9000 usbuhci usbuhci.sys Wed Nov 27 02: 41: 05 2013 (52954DB1)
fffff880`00d8e000 fffff880`00d9b000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`0199d000 fffff880`019ab000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`019ab000 fffff880`019d0000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`014d5000 fffff880`014e5000 vmstorfl vmstorfl.sys Sat Nov 20 10: 57: 30 2010 (4CE79B8A)
fffff880`00db0000 fffff880`00dc5000 volmgr volmgr.sys Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`01072000 fffff880`010be000 volsnap volsnap.sys Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`03a00000 fffff880`03a1b000 wanarp wanarp.sys Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`019d0000 fffff880`019e0000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`00e00000 fffff880`00ec2000 Wdf01000 Wdf01000.sys Sat Jun 22 05: 13: 05 2013 (51C51641)
fffff880`00ec2000 fffff880`00ed2000 WDFLDR WDFLDR.SYS Thu Jul 26 04: 29: 04 2012 (5010AB70)
fffff880`03b9b000 fffff880`03ba4000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff960`00050000 fffff960`00372000 win32k win32k.sys Fri Oct 10 02: 57: 21 2014 (54372EF1)
fffff880`00fee000 fffff880`00ff7000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`08799000 fffff880`087b2000 WudfPf WudfPf.sys Thu Jul 26 04: 26: 45 2012 (5010AAE5)
fffff880`087b2000 fffff880`087e8000 WUDFRd WUDFRd.sys Thu Jul 26 04: 26: 06 2012 (5010AABE)
Unloaded modules:
fffff880`0a6cb000 fffff880`0a73c000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00071000
fffff880`055c4000 fffff880`055e3000 NisDrvWFP.sy
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0001F000
fffff880`08763000 fffff880`08799000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00036000
fffff880`018e4000 fffff880`018f2000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018f2000 fffff880`018fe000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018fe000 fffff880`01907000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`01907000 fffff880`0191a000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Ciąg dalszy błędów w systemie graficznym.
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
Błąd ewidentnie wywalony przez sterownik dxgmms1.sys
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Symbol search path is: srv*c: \symbols*http: //msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
Machine Name:
Kernel base = 0xfffff800`02e5c000 PsLoadedModuleList = 0xfffff800`0309f890
Debug session time: Tue Jan 6 17: 18: 54.538 2015 (UTC + 1: 00)
System Uptime: 0 days 1: 15: 46.364
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {10000028, 982000005ced3005, fffff8800a39a050, a}
Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 0000000010000028, Virtual address for the attempted write.
Arg2: 982000005ced3005, PTE contents.
Arg3: fffff8800a39a050, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: metin2client.b
CURRENT_IRQL: 2
TRAP_FRAME: fffff8800a39a050 -- (.trap 0xfffff8800a39a050)
.trap 0xfffff8800a39a050
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000010000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed7f8d rsp=fffff8800a39a1e0 rbp=fffffa800282fb50
r8=0000000000000000 r9=0000000000000000 r10=fffffa80038ca840
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSignalSynchronizationObject+0x17d:
fffff800`02ed7f8d f083402801 lock add dword ptr [rax+28h],1 ds: 0002: 00000000`10000028=?
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f4e14b to fffff80002ed1bc0
STACK_TEXT:
fffff880`0a399ee8 fffff800`02f4e14b : 00000000`000000be 00000000`10000028 98200000`5ced3005 fffff880`0a39a050 : nt!KeBugCheckEx
fffff880`0a399ef0 fffff800`02ecfcee : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`03b97980 : nt! ? : FNODOBFM: `string'+0x4333b
fffff880`0a39a050 fffff800`02ed7f8d : fffffa80`038ca840 fffffa80`038ca801 fffffa80`01df1330 fffff880`0f00ac71 : nt!KiPageFault+0x16e
fffff880`0a39a1e0 fffff800`02ed6256 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`038ca801 : nt!KiSignalSynchronizationObject+0x17d
fffff880`0a39a230 fffff880`0f03ab1c : fffffa80`00000000 fffffa80`00000000 fffffa80`01df1300 fffffa80`03b97410 : nt!KeSetEvent+0x106
fffff880`0a39a2a0 fffff880`0f03d855 : 00000000`00000001 fffffa80`038caa28 fffff880`0a39a500 00000000`00000000 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x1d8
fffff880`0a39a310 fffff880`0fd53908 : fffff880`0f95a0c2 00000000`00000200 fffff880`0a39aa40 00000000`00000000 : dxgmms1!VidSchSubmitCommand+0x3ad
fffff880`0a39a370 fffff880`0fd52917 : fffff8a0`00000001 fffff8a0`000001ec fffff880`0a39a9f0 fffff880`00000005 : dxgkrnl!DXGCONTEXT: Render+0xadc
fffff880`0a39a980 fffff960`00229c22 : 00000000`0008e1c0 00000000`fffdb000 00000000`00000040 fffff800`02f1cb53 : dxgkrnl!DxgkRender+0x3e7
fffff880`0a39abf0 00000000`0008e1c0 : 00000000`fffdb000 00000000`00000040 fffff800`02f1cb53 fffff800`02ecd603 : win32k+0x199c22
fffff880`0a39abf8 00000000`fffdb000 : 00000000`00000040 fffff800`02f1cb53 fffff800`02ecd603 fffff800`02ed0e53 : 0x8e1c0
fffff880`0a39ac00 00000000`00000040 : fffff800`02f1cb53 fffff800`02ecd603 fffff800`02ed0e53 fffff880`0a39aca0 : 0xfffdb000
fffff880`0a39ac08 fffff800`02f1cb53 : fffff800`02ecd603 fffff800`02ed0e53 fffff880`0a39aca0 00000000`fffdb001 : 0x40
fffff880`0a39ac10 fffff800`02ed0e53 : fffff880`0a39aca0 00000000`fffdb001 fffffa80`00000000 fffffa80`01c77e70 : nt!KiDpcInterruptBypass+0x13
fffff880`0a39ac20 00000000`74cc164a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e198 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74cc164a
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
fffff880`0f03ab1c 4c8d5c2440 lea r11,[rsp+40h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5164dc13
FAILURE_BUCKET_ID: X64_0xBE_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
BUCKET_ID: X64_0xBE_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
Followup: MachineOwner
---------
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 10.01.2015 20:56 przez thermalfake.)
10.01.2015 20:33
|