Skocz do zawartości
Xemidra

BSOD, nowy komp, problem HELP

Rekomendowane odpowiedzi

Mam nowy komp, od jego początku mam z nim problemy tzn. często (szczególnie podczas grania) wyskakują BSOD. Zawsze przed jak i po tym zdarzeniu w dzienniku zdarzeń przewijają się te same komunikaty. Robiłem test programem memtest oraz pełne skanowanie 6 antywirusami oraz Spybodem. Skanowałem dysk na obeznośc "bad" sektorów i nic nie znalazło. Podczas BSOD najczęściej widnieje napis: MEMORY_MANAGENT. Mój system to Windows 7 x64 Ultimate.

 

Pierwszy BSOD:

 

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050310-16489-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50Debug session time: Mon May 3 08:22:14.027 2010 (GMT+2)System Uptime: 0 days 1:44:21.338Loading Kernel Symbols............................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa80018c5490, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> lmvm ntstart end module namefffff800`02c52000 fffff800`0322e000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

Drugi BSOD:

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050510-18158-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50Debug session time: Wed May 5 16:57:51.666 2010 (GMT+2)System Uptime: 0 days 3:27:22.977Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa80031b9570, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80031b9570Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: Metin2Mod.binCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`0782c828 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`031b9570 00000000`0000ffff : nt!KeBugCheckExfffff880`0782c830 fffff800`02cf5cc9 : 00000000`00000000 00000000`0fbb4fff ffffffff`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`0782c9f0 fffff800`02fdc170 : fffffa80`06d36180 0007ffff`00000000 fffffa80`06e8b260 fffffa80`06e8b260 : nt!MiRemoveMappedView+0xd9fffff880`0782cb10 fffff800`02fdc57b : 00000000`00000000 00000000`0bd80000 fffffa80`00000001 00000000`00008001 : nt!MiUnmapViewOfSection+0x1b0fffff880`0782cbd0 fffff800`02cc1853 : ffffffff`ffffffff 00000000`0008e310 fffffa80`05e3e880 00000000`00008000 : nt!NtUnmapViewOfSection+0x5ffffff880`0782cc20 00000000`77a5015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a5015aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> lmvm ntstart end module namefffff800`02c52000 fffff800`0322e000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

Trzeci BSOD:

 

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050710-27284-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e54e50Debug session time: Fri May 7 18:47:10.332 2010 (GMT+2)System Uptime: 0 days 4:01:20.082Loading Kernel Symbols.....................................................................................................................................................................Loading User SymbolsLoading unloaded module list..........******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa8000042060, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa8000042060Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: explorer.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002cfaede to fffff80002c87600STACK_TEXT: fffff880`06d7b828 fffff800`02cfaede : 00000000`0000001a 00000000`00041790 fffffa80`00042060 00000000`0000ffff : nt!KeBugCheckExfffff880`06d7b830 fffff800`02cbacc9 : 00000000`00000000 00000000`16955fff fffffa80`00000000 fffff800`02c90000 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`06d7b9f0 fffff800`02fa1170 : fffffa80`06e7e110 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9fffff880`06d7bb10 fffff800`02fa157b : 00000000`00000000 00000000`15600000 fffffa80`00000001 fffffa80`067a6490 : nt!MiUnmapViewOfSection+0x1b0fffff880`06d7bbd0 fffff800`02c86853 : fffffa80`03c11060 fffff880`06d7bca0 fffffa80`073f2060 00000000`0951f870 : nt!NtUnmapViewOfSection+0x5ffffff880`06d7bc20 00000000`778a015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`065de858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778a015aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02cfaede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------0: kd> lmvm ntstart end module namefffff800`02c17000 fffff800`031f3000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

Czwarty BSOD:

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050810-16785-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50Debug session time: Sat May 8 12:53:06.320 2010 (GMT+2)System Uptime: 0 days 0:29:36.005Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41284, 7fefbddc001, 0, fffff70001080000}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )Followup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: 000007fefbddc001Arg3: 0000000000000000Arg4: fffff70001080000Debugging Details:------------------BUGCHECK_STR: 0x1a_41284CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: SearchProtocolCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d10df3 to fffff80002cba600STACK_TEXT: fffff880`077645f8 fffff800`02d10df3 : 00000000`0000001a 00000000`00041284 000007fe`fbddc001 00000000`00000000 : nt!KeBugCheckExfffff880`07764600 fffff800`02d2dc03 : fffffa80`00000000 00000000`000000e3 00000000`00000000 000007fe`ff590000 : nt! ?? ::FNODOBFM::`string'+0x4a83fffff880`07764640 fffff800`02cedcc9 : fffffa80`00000000 000007fe`fbebbfff 00000000`00000000 fffffa80`04d5c0c8 : nt! ?? ::FNODOBFM::`string'+0x3364bfffff880`07764800 fffff800`02c8d734 : ffffffff`ffffffff fffff880`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9fffff880`07764920 fffff800`02fa0c4f : fffff8a0`0991ea70 fffff880`07764c20 00000000`00000000 fffffa80`041a8820 : nt!MmCleanProcessAddressSpace+0x228fffff880`07764970 fffff800`02f794d1 : 00000000`00000000 fffff8a0`09a97601 000007ff`fffac000 00000000`00000000 : nt!PspExitThread+0x92ffffff880`07764a30 fffff800`02c970e3 : 00000000`00000000 fffffa80`05eb59d0 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1dfffff880`07764a60 fffff800`02c97520 : 00000000`77724298 fffff880`07764ae0 fffff800`02f795dc 00000000`00000001 : nt!KiDeliverApc+0x2ebfffff880`07764ae0 fffff800`02cb98f7 : fffffa80`041a8820 00000000`77724270 00000000`000000c0 fffff8a0`09a5a030 : nt!KiInitiateUserApc+0x70fffff880`07764c20 00000000`776717ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c00000000`0134f528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776717baSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4a83fffff800`02d10df3 cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a83FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83Followup: MachineOwner---------2: kd> lmvm ntstart end module namefffff800`02c4a000 fffff800`03226000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

 

Piąty BSOD:

 

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050810-20389-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50Debug session time: Sat May 8 15:09:56.506 2010 (GMT+2)System Uptime: 0 days 1:19:01.192Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck FE, {8, 6, 6, fffffa80058cfb20}Probably caused by : usbhub.sys ( usbhub!UsbhHubProcessChangeWorker+ec )Followup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************BUGCODE_USB_DRIVER (fe)USB Driver bugcheck, first parameter is USB bugcheck code.Arguments:Arg1: 0000000000000008, USBBUGCODE_RESERVED_USBHUBArg2: 0000000000000006, USBHUB_TRAP_FATAL_TIMEOUTArg3: 0000000000000006, TimeoutCode: Timeout_PCE_Disable_Action - PortData->PortChangeListDone - Timeout trying to set Disable bitArg4: fffffa80058cfb20, TimeoutContext - PortDataDebugging Details:------------------CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xFEPROCESS_NAME: SystemCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff8800584a9ec to fffff80002cd8600STACK_TEXT: fffff880`031cbc18 fffff880`0584a9ec : 00000000`000000fe 00000000`00000008 00000000`00000006 00000000`00000006 : nt!KeBugCheckExfffff880`031cbc20 fffff800`02fd5827 : fffffa80`057de050 fffffa80`057b0230 ffffffff`dc3a58a0 fffff800`02e7d5f8 : usbhub!UsbhHubProcessChangeWorker+0xecfffff880`031cbc80 fffff800`02ce5861 : fffff800`02e7d500 fffff800`02fd5804 fffffa80`039e9b60 00000000`00000000 : nt!IopProcessWorkItem+0x23fffff880`031cbcb0 fffff800`02f7da86 : 0000056e`00000000 fffffa80`039e9b60 00000000`00000080 fffffa80`039d6040 : nt!ExpWorkerThread+0x111fffff880`031cbd40 fffff800`02cb6b06 : fffff880`02f63180 fffffa80`039e9b60 fffff880`02f6dfc0 0000056e`00000000 : nt!PspSystemThreadStartup+0x5afffff880`031cbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16STACK_COMMAND: kbFOLLOWUP_IP: usbhub!UsbhHubProcessChangeWorker+ecfffff880`0584a9ec cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: usbhub!UsbhHubProcessChangeWorker+ecFOLLOWUP_NAME: MachineOwnerMODULE_NAME: usbhubIMAGE_NAME: usbhub.sysDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc2dFAILURE_BUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ecBUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ecFollowup: MachineOwner---------2: kd> lmvm usbhubstart end module namefffff880`05838000 fffff880`05892000 usbhub (pdb symbols) c:\symbols\usbhub.pdb\295DCA65F67B44BF8DD26C3B6D89A6F71\usbhub.pdb Loaded symbol image file: usbhub.sys Mapped memory image file: c:\symbols\usbhub.sys\4A5BCC2D5a000\usbhub.sys Image path: \SystemRoot\system32\DRIVERS\usbhub.sys Image name: usbhub.sys Timestamp: Tue Jul 14 02:07:09 2009 (4A5BCC2D) CheckSum: 0005BB10 ImageSize: 0005A000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: usbhub.sys OriginalFilename: usbhub.sys ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: Default Hub Driver for USB LegalCopyright: © Microsoft Corporation. All rights reserved.

Szósty BSOD:

 

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\051010-18454-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c03000 PsLoadedModuleList = 0xfffff800`02e40e50Debug session time: Mon May 10 19:45:34.460 2010 (GMT+2)System Uptime: 0 days 1:03:41.145Loading Kernel Symbols.......................................................................................................................................................................Loading User SymbolsLoading unloaded module list..........******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {5100, fffff6fc80650f20, 2b4, 1}Probably caused by : win32k.sys ( win32k!AllocateObject+dd )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000005100, The subtype of the bugcheck.Arg2: fffff6fc80650f20Arg3: 00000000000002b4Arg4: 0000000000000001Debugging Details:------------------BUGCHECK_STR: 0x1a_5100CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: explorer.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002ccd267 to fffff80002c73600STACK_TEXT: fffff880`07a3f718 fffff800`02ccd267 : 00000000`0000001a 00000000`00005100 fffff6fc`80650f20 00000000`000002b4 : nt!KeBugCheckExfffff880`07a3f720 fffff800`02c9e7fb : 00000000`00000698 fffff880`07a3f880 fffff900`c9e00000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0xae27fffff880`07a3f830 fffff800`02da4ceb : 00000000`00698000 00000000`00698000 00000000`00000021 fffff880`07a3fab0 : nt!MiAllocatePagedPoolPages+0x4bbfffff880`07a3f950 fffff800`02c85f60 : 00000000`00698000 fffff880`021c9cc0 00000000`00000021 00000000`00000000 : nt!MiAllocatePoolPages+0x8e2fffff880`07a3faa0 fffff800`02da7bfe : 00000000`00000000 00000000`00095f21 fffff800`00000020 fffff880`021c9cc0 : nt!ExpAllocateBigPool+0xb0fffff880`07a3fb90 fffff960`001828ed : 00000000`00003392 00000000`00000000 00000000`00000000 fffff960`001940d1 : nt!ExAllocatePoolWithTag+0x82efffff880`07a3fc80 fffff960`00183e0f : 00000000`00000001 fffff880`07a3fe18 00000000`00000001 fffff960`00194302 : win32k!AllocateObject+0xddfffff880`07a3fcc0 fffff960`00159f2f : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SURFMEM::bCreateDIB+0x1fbfffff880`07a3fdb0 fffff960`00158fa5 : 00000000`2a010160 fffffa80`069cf4f0 00000000`00000000 00000000`00000001 : win32k!GreCreateDIBitmapReal+0x533fffff880`07a3fee0 fffff800`02c72853 : 00000000`2a010160 fffffa80`00000780 00000000`000004b0 00000000`00000002 : win32k!NtGdiCreateDIBitmapInternal+0x231fffff880`07a3ffb0 000007fe`fdb05e2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`001ed988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb05e2aSTACK_COMMAND: kbFOLLOWUP_IP: win32k!AllocateObject+ddfffff960`001828ed 488bd8 mov rbx,raxSYMBOL_STACK_INDEX: 6SYMBOL_NAME: win32k!AllocateObject+ddFOLLOWUP_NAME: MachineOwnerMODULE_NAME: win32kIMAGE_NAME: win32k.sysDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0FAILURE_BUCKET_ID: X64_0x1a_5100_win32k!AllocateObject+ddBUCKET_ID: X64_0x1a_5100_win32k!AllocateObject+ddFollowup: MachineOwner---------3: kd> lmvm win32kstart end module namefffff960`000d0000 fffff960`003df000 win32k (pdb symbols) c:\symbols\win32k.pdb\A9F6403F14074E9D8A07D0AA6F0C1CFF2\win32k.pdb Loaded symbol image file: win32k.sys Mapped memory image file: c:\symbols\win32k.sys\4A5BC5E030f000\win32k.sys Image path: \SystemRoot\System32\win32k.sys Image name: win32k.sys Timestamp: Tue Jul 14 01:40:16 2009 (4A5BC5E0) CheckSum: 002FE623 ImageSize: 0030F000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: win32k.sys OriginalFilename: win32k.sys ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: Multi-User Win32 Driver LegalCopyright: © Microsoft Corporation. All rights reserved.

Załączam również:

 

Dziennik zdarzeń oraz all mini-dump:

 

http://www.przeklej....tx-0014cq2er6jo

http://www.przeklej....mp-0014cq2ns5a5

http://www.przeklej....mp-0014cq2tk40i

http://www.przeklej....mp-0014cq32hbq4

http://www.przeklej....mp-0014cq3e1agh

http://www.przeklej....mp-0014cq42q7tb

http://www.przeklej....mp-0014cq48q2mv

 

 

HASŁO DO PLIKÓW: pomocy

PROSZĘ NIECH MI KTOŚ POMOŻE !!!

Ja już nie wiem co z tym zrobić !

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Przywróć formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

Ładowanie


×
×
  • Dodaj nową pozycję...