| thermalfake Ostatni Mohikanin
 
 
   
Liczba postów: 13.580
	
 | RE: Blue screen na systemie Windows 7 Home Premium
 
			Pierwszy błąd 
Kod:
 Microsoft (R) Windows Debugger Version 6.12.0002.633 X86Copyright (c) Microsoft Corporation. All rights reserved.
 
 
 Loading Dump File [C: \Users\user\Desktop\bsod\081811-28407-01.dmp]
 Mini Kernel Dump File:  Only registers and stack trace are available
 
 Symbol search path is:  C: \Symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
 Executable search path is:
 Windows 7 Kernel Version 7600 MP (2 procs) Free x64
 Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
 Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
 Machine Name:
 Kernel base = 0xfffff800`02611000 PsLoadedModuleList = 0xfffff800`0284ee50
 Debug session time:  Thu Aug 18 17: 04: 40.002 2011 (UTC + 2: 00)
 System Uptime:  0 days 0: 02: 06.843
 Loading Kernel Symbols
 .
 
 Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
 Run !sym noisy before .reload to track down problems loading symbols.
 
 ..............................................................
 ................................................................
 .............
 Loading User Symbols
 Loading unloaded module list
 ....
 *******************************************************************************
 *                                                                             *
 *                        Bugcheck Analysis                                    *
 *                                                                             *
 *******************************************************************************
 
 Use !analyze -v to get detailed debugging information.
 
 BugCheck 109, {a3a039d8956d565d, b3b7465ee7ea288b, fffff8000276fa50, 1}
 
 *** WARNING:  Unable to verify timestamp for win32k.sys
 Probably caused by :  memory_corruption
 
 Followup:  memory_corruption
 ---------
 
 0:  kd> !analyze -v
 *******************************************************************************
 *                                                                             *
 *                        Bugcheck Analysis                                    *
 *                                                                             *
 *******************************************************************************
 
 CRITICAL_STRUCTURE_CORRUPTION (109)
 This bugcheck is generated when the kernel detects that critical kernel code or
 data have been corrupted. There are generally three causes for a corruption:
 1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http: //www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
 2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
 Arguments:
 Arg1:  a3a039d8956d565d, Reserved
 Arg2:  b3b7465ee7ea288b, Reserved
 Arg3:  fffff8000276fa50, Failure type dependent information
 Arg4:  0000000000000001, Type of corrupted region, can be
 0 :  A generic data region
 1 :  Modification of a function or .pdata
 2 :  A processor IDT
 3 :  A processor GDT
 4 :  Type 1 process list corruption
 5 :  Type 2 process list corruption
 6 :  Debug routine modification
 7 :  Critical MSR modification
 
 Debugging Details:
 ------------------
 
 
 BUGCHECK_STR:   0x109
 
 CUSTOMER_CRASH_COUNT:   1
 
 DEFAULT_BUCKET_ID:   CODE_CORRUPTION
 
 PROCESS_NAME:   System
 
 CURRENT_IRQL:   0
 
 LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff80002682f00
 
 STACK_TEXT:
 fffff880`02fee5d8 00000000`00000000 :  00000000`00000109 a3a039d8`956d565d b3b7465e`e7ea288b fffff800`0276fa50 :  nt!KeBugCheckEx
 
 
 STACK_COMMAND:   kb
 
 CHKIMG_EXTENSION:  !chkimg -lo 50 -d !nt
 fffff8000276fc2a - nt!MiSetSystemCodeProtection+1da
 [ f6: 76 ]
 1 error :  !nt (fffff8000276fc2a)
 
 MODULE_NAME:  memory_corruption
 
 IMAGE_NAME:   memory_corruption
 
 FOLLOWUP_NAME:   memory_corruption
 
 DEBUG_FLR_IMAGE_TIMESTAMP:   0
 
 MEMORY_CORRUPTOR:   ONE_BIT
 
 FAILURE_BUCKET_ID:   X64_MEMORY_CORRUPTION_ONE_BIT
 
 BUCKET_ID:   X64_MEMORY_CORRUPTION_ONE_BIT
 
 Followup:  memory_corruption
 ---------
 
Kod:
 Microsoft (R) Windows Debugger Version 6.12.0002.633 X86Copyright (c) Microsoft Corporation. All rights reserved.
 
 
 Loading Dump File [C: \Users\user\Desktop\bsod\081811-31683-01.dmp]
 Mini Kernel Dump File:  Only registers and stack trace are available
 
 Symbol search path is:  C: \Symbols;symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
 Executable search path is:
 Windows 7 Kernel Version 7600 MP (2 procs) Free x64
 Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
 Built by:  7600.16385.amd64fre.win7_rtm.090713-1255
 Machine Name:
 Kernel base = 0xfffff800`02660000 PsLoadedModuleList = 0xfffff800`0289de50
 Debug session time:  Thu Aug 18 20: 09: 11.060 2011 (UTC + 2: 00)
 System Uptime:  0 days 0: 42: 00.011
 Loading Kernel Symbols
 ...............................................................
 ................................................................
 ................
 Loading User Symbols
 Loading unloaded module list
 ....
 *******************************************************************************
 *                                                                             *
 *                        Bugcheck Analysis                                    *
 *                                                                             *
 *******************************************************************************
 
 Use !analyze -v to get detailed debugging information.
 
 BugCheck 109, {a3a039d896654949, b3b7465ee8e21b77, fffff800028d8000, 1}
 
 Probably caused by :  Unknown_Image ( ANALYSIS_INCONCLUSIVE )
 
 Followup:  MachineOwner
 ---------
 
 0:  kd> !analyze -v
 *******************************************************************************
 *                                                                             *
 *                        Bugcheck Analysis                                    *
 *                                                                             *
 *******************************************************************************
 
 CRITICAL_STRUCTURE_CORRUPTION (109)
 This bugcheck is generated when the kernel detects that critical kernel code or
 data have been corrupted. There are generally three causes for a corruption:
 1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http: //www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
 2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
 Arguments:
 Arg1:  a3a039d896654949, Reserved
 Arg2:  b3b7465ee8e21b77, Reserved
 Arg3:  fffff800028d8000, Failure type dependent information
 Arg4:  0000000000000001, Type of corrupted region, can be
 0 :  A generic data region
 1 :  Modification of a function or .pdata
 2 :  A processor IDT
 3 :  A processor GDT
 4 :  Type 1 process list corruption
 5 :  Type 2 process list corruption
 6 :  Debug routine modification
 7 :  Critical MSR modification
 
 Debugging Details:
 ------------------
 
 
 BUGCHECK_STR:   0x109
 
 CUSTOMER_CRASH_COUNT:   1
 
 DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT
 
 PROCESS_NAME:   System
 
 CURRENT_IRQL:   0
 
 LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff800026d1f00
 
 STACK_TEXT:
 fffff880`02fe05d8 00000000`00000000 :  00000000`00000109 a3a039d8`96654949 b3b7465e`e8e21b77 fffff800`028d8000 :  nt!KeBugCheckEx
 
 
 STACK_COMMAND:   kb
 
 SYMBOL_NAME:   ANALYSIS_INCONCLUSIVE
 
 FOLLOWUP_NAME:   MachineOwner
 
 MODULE_NAME:  Unknown_Module
 
 IMAGE_NAME:   Unknown_Image
 
 DEBUG_FLR_IMAGE_TIMESTAMP:   0
 
 BUCKET_ID:   BAD_STACK
 
 Followup:  MachineOwner
 ---------
 
Następny błąd taki sam jak poprzedni. 
Wypaliłeś płytkę to musi działać. Dobrze bootujesz z nośnika? Wystarczy uruchomić podczas startu boot menu zazwyczaj to jest klawisz funkcyjny F1-F12 i wybrać napęd. Zrób test pamięci najpierw obydwóch, jak pojawią się błędy (czasem nie tak szybko) to kończysz test, wyjmujesz jedną kostkę, uruchamiasz komputer i kolejny test. Może być uszkodzona zarówno jedna jak i wszystkie lub co gorsza banki pamięci na płycie głównej także.
		
 ![[Obrazek: 2089620800_1406976151.png]](http://obrazki.elektroda.pl/2089620800_1406976151.png) 
 W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
 Jak mądrze zadawać pytania?  - przejrzyj poradnik na forum.
 Nie udzielam porad via PW.
 
			
(Ten post był ostatnio modyfikowany: 19.08.2011 16:57 przez thermalfake.)
 19.08.2011 16:39 |