Odpowiedz

Częste bluescreen'y na 7/32 bit Home przed i po formacie na 7/Ultimate 64bit

 
zidus
Wdrażany
Liczba postów: 13
Post: #5

RE: Częste bluescreen'y na 7/32 bit Home przed i po formacie na 7/Ultimate 64bit


Specyfikacja kompa:
Procesor: Intel® Core™ i5 520M
(2,40 GHz / L2 cache 3 MB)

Pamięć Pamięć systemu 4 GB (2 GB + 2 GB) / max. 8 GB DDR3

Matryca
Wyświetlacz 15,6" LED HD (1366x768) 16:9 błyszcząca
Grafika Chipset nVIDIA GeForce GT 330M
Pamięć 1 024 MB
Multimedia Dźwięk Tak (HD)
Nośniki danych Dysk twardy 500 GB (SATA, 5 400 rpm)

System operacyjny : Windows 7 Ultimate x64



Dołączam dzis kolejny BSOD:


Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Windows\Minidump\112810-18517-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

WARNING:  Whitespace at end of path element
Symbol search path is:  SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`03247e50
Debug session time:  Sun Nov 28 17: 56: 01.080 2010 (UTC + 1: 00)
System Uptime:  0 days 2: 58: 59.642
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {3c, 2, 1, fffff8800610a6fe}

Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for RTKVHD64.sys
*** ERROR:  Module load completed but symbols could not be loaded for RTKVHD64.sys
Probably caused by :  RTKVHD64.sys ( RTKVHD64+b46fe )

Followup:  MachineOwner
---------

2:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1:  000000000000003c, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000001, value 0 = read operation, 1 = write operation
Arg4:  fffff8800610a6fe, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  GetPointerFromAddress:  unable to read from fffff800032b20e0
000000000000003c

CURRENT_IRQL:   2

FAULTING_IP:  
RTKVHD64+b46fe
fffff880`0610a6fe f30f115438fc    movss   dword ptr [rax+rdi-4],xmm2

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xD1

PROCESS_NAME:   System

TRAP_FRAME:   fffff88008624570 -- (.trap 0xfffff88008624570)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=0000000000000020
rdx=0000000000000060 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800610a6fe rsp=fffff88008624700 rbp=0000000000000000
r8=0000000000000040  r9=0000000000000010 r10=fffff8800619b040
r11=ffffffffffffffe0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
RTKVHD64+0xb46fe:
fffff880`0610a6fe f30f115438fc    movss   dword ptr [rax+rdi-4],xmm2 ds: 00ff: 00000000`0000001c=??
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff8000307b469 to fffff8000307bf00

STACK_TEXT:  
fffff880`08624428 fffff800`0307b469 :  00000000`0000000a 00000000`0000003c 00000000`00000002 00000000`00000001 :  nt!KeBugCheckEx
fffff880`08624430 fffff800`0307a0e0 :  00000000`00000000 fffffa80`07747000 00000000`00000000 00000000`00000000 :  nt!KiBugCheckDispatch+0x69
fffff880`08624570 fffff880`0610a6fe :  fffff880`0619b730 fffff880`0619b330 00000000`00000000 fffffa80`07747000 :  nt!KiPageFault+0x260
fffff880`08624700 fffff880`0619b730 :  fffff880`0619b330 00000000`00000000 fffffa80`07747000 fffffa80`07719040 :  RTKVHD64+0xb46fe
fffff880`08624708 fffff880`0619b330 :  00000000`00000000 fffffa80`07747000 fffffa80`07719040 00000000`00000009 :  RTKVHD64+0x145730
fffff880`08624710 00000000`00000000 :  fffffa80`07747000 fffffa80`07719040 00000000`00000009 fffffa80`07710040 :  RTKVHD64+0x145330


STACK_COMMAND:   kb

FOLLOWUP_IP:  
RTKVHD64+b46fe
fffff880`0610a6fe f30f115438fc    movss   dword ptr [rax+rdi-4],xmm2

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   RTKVHD64+b46fe

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  RTKVHD64

IMAGE_NAME:   RTKVHD64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4b260be7

FAILURE_BUCKET_ID:   X64_0xD1_RTKVHD64+b46fe

BUCKET_ID:   X64_0xD1_RTKVHD64+b46fe

Followup:  MachineOwner
---------

2:  kd> lmvm RTKVHD64
start             end                 module name
fffff880`06056000 fffff880`06273900   RTKVHD64 T (no symbols)          
    Loaded symbol image file:  RTKVHD64.sys
    Image path:  \SystemRoot\system32\drivers\RTKVHD64.sys
    Image name:  RTKVHD64.sys
    Timestamp:         Mon Dec 14 10: 56: 55 2009 (4B260BE7)
    CheckSum:          0022191A
    ImageSize:         0021D900
    Translations:      0000.04b0 0000.04e4 0409.04b0 0409.04e4




EDIT: DODAJE KOLEJNY!


Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Windows\Minidump\112910-21216-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`0325ce50
Debug session time:  Mon Nov 29 14: 50: 01.020 2010 (UTC + 1: 00)
System Uptime:  0 days 2: 53: 17.207
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffff80003d8e980, 2, 1, fffff800030d6405}

Probably caused by :  memory_corruption ( nt!MmZeroPageThread+490 )

Followup:  MachineOwner
---------

0:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1:  fffff80003d8e980, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000001, bitfield :
    bit 0 :  value 0 = read operation, 1 = write operation
    bit 3 :  value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4:  fffff800030d6405, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  GetPointerFromAddress:  unable to read from fffff800032c70e0
fffff80003d8e980

CURRENT_IRQL:   2

FAULTING_IP:  
nt!MmZeroPageThread+490
fffff800`030d6405 41ff87004b0000  inc     dword ptr [r15+4B00h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xA

PROCESS_NAME:   System

TRAP_FRAME:   fffff880009a9a80 -- (.trap 0xfffff880009a9a80)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d6405 rsp=fffff880009a9c10 rbp=000000000000003f
r8=0000000000000000  r9=0000000000000000 r10=fffffa8003a80a20
r11=0000000000000016 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MmZeroPageThread+0x490:
fffff800`030d6405 41ff87004b0000  inc     dword ptr [r15+4B00h] ds: 1040: 00000000`00004b00=??
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff8000308eca9 to fffff8000308f740

STACK_TEXT:  
fffff880`009a9938 fffff800`0308eca9 :  00000000`0000000a fffff800`03d8e980 00000000`00000002 00000000`00000001 :  nt!KeBugCheckEx
fffff880`009a9940 fffff800`0308d920 :  00000000`00000000 00000000`00032440 00000000`00000000 00000000`00000000 :  nt!KiBugCheckDispatch+0x69
fffff880`009a9a80 fffff800`030d6405 :  fffffa80`03a80a00 00000000`00000008 00000000`0000003f 00000000`00000000 :  nt!KiPageFault+0x260
fffff880`009a9c10 fffff800`03333c06 :  fffffa80`03b51040 00000000`00000080 fffffa80`03b506f0 fffff800`0306dc19 :  nt!MmZeroPageThread+0x490
fffff880`009a9d40 fffff800`0306dc26 :  fffff800`03209e80 fffffa80`03b51040 fffff800`03217c40 9090c35b`5d5f20c4 :  nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 :  fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 :  nt!KxStartSystemThread+0x16


STACK_COMMAND:   kb

FOLLOWUP_IP:  
nt!MmZeroPageThread+490
fffff800`030d6405 41ff87004b0000  inc     dword ptr [r15+4B00h]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   nt!MmZeroPageThread+490

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

DEBUG_FLR_IMAGE_TIMESTAMP:   4c1c44a9

IMAGE_NAME:   memory_corruption

FAILURE_BUCKET_ID:   X64_0xA_nt!MmZeroPageThread+490

BUCKET_ID:   X64_0xA_nt!MmZeroPageThread+490

Followup:  MachineOwner
---------

0:  kd> lmvm nt
start             end                 module name
fffff800`0301f000 fffff800`035fb000   nt         (pdb symbols)          c: \symbols\ntkrnlmp.pdb\30092BE745B24FE2A311A936E7B7486F2\ntkrnlmp.pdb
    Loaded symbol image file:  ntkrnlmp.exe
    Mapped memory image file:  c: \symbols\ntoskrnl.exe\4C1C44A95dc000\ntoskrnl.exe
    Image path:  ntkrnlmp.exe
    Image name:  ntkrnlmp.exe
    Timestamp:         Sat Jun 19 06: 16: 41 2010 (4C1C44A9)
    CheckSum:          005489D7
    ImageSize:         005DC000
    File version:      6.1.7600.16617
    Product version:   6.1.7600.16617
    File flags:        0 (Mask 3F)
    File OS:           40004 NT Win32
    File type:         1.0 App
    File date:         00000000.00000000
    Translations:      0409.04b0
    CompanyName:       Microsoft Corporation
    ProductName:       Microsoft® Windows® Operating System
    InternalName:      ntkrnlmp.exe
    OriginalFilename:  ntkrnlmp.exe
    ProductVersion:    6.1.7600.16617
    FileVersion:       6.1.7600.16617 (win7_gdr.100618-1621)
    FileDescription:   NT Kernel & System
    LegalCopyright:    © Microsoft Corporation. All rights reserved.


No to kolejny... Smutny

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Windows\Minidump\112910-23696-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  SRV*c: \symbols*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS
Built by:  7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0305d000 PsLoadedModuleList = 0xfffff800`0329ae50
Debug session time:  Mon Nov 29 18: 57: 07.699 2010 (UTC + 1: 00)
System Uptime:  0 days 4: 06: 37.885
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {fffff8804701f988, 2, 0, fffff880046fb3fb}

Unable to load image \SystemRoot\system32\DRIVERS\athrx.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for athrx.sys
*** ERROR:  Module load completed but symbols could not be loaded for athrx.sys
Probably caused by :  athrx.sys ( athrx+c43fb )

Followup:  MachineOwner
---------

0:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1:  fffff8804701f988, memory referenced
Arg2:  0000000000000002, IRQL
Arg3:  0000000000000000, value 0 = read operation, 1 = write operation
Arg4:  fffff880046fb3fb, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  GetPointerFromAddress:  unable to read from fffff800033050e0
fffff8804701f988

CURRENT_IRQL:   2

FAULTING_IP:  
athrx+c43fb
fffff880`046fb3fb 488b8c2488000000 mov     rcx,qword ptr [rsp+88h]

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0xD1

PROCESS_NAME:   System

TRAP_FRAME:   fffff8800301f770 -- (.trap 0xfffff8800301f770)
NOTE:  The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004771e70
rdx=fffffa80083b8650 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880046fb3fb rsp=fffff8800301f900 rbp=0000000000000080
r8=0000000000000000  r9=0000000000000000 r10=fffffa800708fc90
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
athrx+0xc43fb:
fffff880`046fb3fb 488b8c2488000000 mov     rcx,qword ptr [rsp+88h] ss: fffff880`0301f988=fffffa8004771e58
Resetting default scope

LAST_CONTROL_TRANSFER:   from fffff800030ccca9 to fffff800030cd740

STACK_TEXT:  
fffff880`0301f628 fffff800`030ccca9 :  00000000`0000000a fffff880`4701f988 00000000`00000002 00000000`00000000 :  nt!KeBugCheckEx
fffff880`0301f630 fffff800`030cb920 :  fffffa80`04e80030 fffffa80`0734a470 fffffa80`07018620 00000000`00000000 :  nt!KiBugCheckDispatch+0x69
fffff880`0301f770 fffff880`046fb3fb :  fffffa80`04771e70 fffffa80`070ab7e8 fffffa80`083b8660 fffffa80`0734a470 :  nt!KiPageFault+0x260
fffff880`0301f900 fffffa80`04771e70 :  fffffa80`070ab7e8 fffffa80`083b8660 fffffa80`0734a470 00000000`00000000 :  athrx+0xc43fb
fffff880`0301f908 fffffa80`070ab7e8 :  fffffa80`083b8660 fffffa80`0734a470 00000000`00000000 fffffa80`080a8c50 :  0xfffffa80`04771e70
fffff880`0301f910 fffffa80`083b8660 :  fffffa80`0734a470 00000000`00000000 fffffa80`080a8c50 00000000`00000000 :  0xfffffa80`070ab7e8
fffff880`0301f918 fffffa80`0734a470 :  00000000`00000000 fffffa80`080a8c50 00000000`00000000 00000000`00000000 :  0xfffffa80`083b8660
fffff880`0301f920 00000000`00000000 :  fffffa80`080a8c50 00000000`00000000 00000000`00000000 fffff880`030d5016 :  0xfffffa80`0734a470


STACK_COMMAND:   kb

FOLLOWUP_IP:  
athrx+c43fb
fffff880`046fb3fb 488b8c2488000000 mov     rcx,qword ptr [rsp+88h]

SYMBOL_STACK_INDEX:   3

SYMBOL_NAME:   athrx+c43fb

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  athrx

IMAGE_NAME:   athrx.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4c105fdf

FAILURE_BUCKET_ID:   X64_0xD1_athrx+c43fb

BUCKET_ID:   X64_0xD1_athrx+c43fb

Followup:  MachineOwner
---------

0:  kd> lmvm athrx
start             end                 module name
fffff880`04637000 fffff880`047c2000   athrx    T (no symbols)          
    Loaded symbol image file:  athrx.sys
    Image path:  \SystemRoot\system32\DRIVERS\athrx.sys
    Image name:  athrx.sys
    Timestamp:         Thu Jun 10 05: 45: 35 2010 (4C105FDF)
    CheckSum:          00194CCE
    ImageSize:         0018B000
    Translations:      0000.04b0 0000.04e4 0409.04b0 0409.04e4
(Ten post był ostatnio modyfikowany: 29.11.2010 19:03 przez zidus.)

28.11.2010 18:08

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
Odpowiedz


Wiadomości w tym wątku
RE: Częste bluescreen'y na 7/32 bit Home przed i po formacie na 7/Ultimate 64bit - zidus - 28.11.2010 18:08
Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
Windows 7 64bit Blue Screen 116 MisterDui 5 2.021 02.03.2017 16:24
Ostatni post: thermalfake
Windows 7 - Częste zawieszenia - Brak Odpowiedzi Programy się długo uruchamiają jackadam 1 1.475 18.01.2017 12:19
Ostatni post: AntrixPL
Problemy z Win7 - częste BSOD-y dominik04u 0 1.025 14.10.2016 09:15
Ostatni post: dominik04u
Windows 7 x64 Bluescreen przy grach skailer213 1 1.237 04.08.2016 14:46
Ostatni post: thermalfake
Problem z Wifi po formacie laptopa i nie skończone instalowanie aktualizacji Xylos 2 1.372 05.04.2016 22:46
Ostatni post: thermalfake
Automatyczne POPRAWNE zamknięcie aplikacji przed wyłaczeniem systemu oleevier 0 1.245 05.03.2016 21:38
Ostatni post: oleevier
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 0 głosów.