Xemidra Opublikowano 11 Maja 2010 Zgłoś Opublikowano 11 Maja 2010 Mam nowy komp, od jego początku mam z nim problemy tzn. często (szczególnie podczas grania) wyskakują BSOD. Zawsze przed jak i po tym zdarzeniu w dzienniku zdarzeń przewijają się te same komunikaty. Robiłem test programem memtest oraz pełne skanowanie 6 antywirusami oraz Spybodem. Skanowałem dysk na obeznośc "bad" sektorów i nic nie znalazło. Podczas BSOD najczęściej widnieje napis: MEMORY_MANAGENT. Mój system to Windows 7 x64 Ultimate. Pierwszy BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050310-16489-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50Debug session time: Mon May 3 08:22:14.027 2010 (GMT+2)System Uptime: 0 days 1:44:21.338Loading Kernel Symbols............................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa80018c5490, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80018c5490Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: dwm.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`09f97968 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`018c5490 00000000`0000ffff : nt!KeBugCheckExfffff880`09f97970 fffff800`02d03fca : 00000000`00000000 00000000`024dffff fffffa80`00000000 fffffa80`073efb30 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`09f97b30 fffff800`02cc1853 : ffffffff`ffffffff 00000000`01e9e8c8 00000000`01e9e8c0 00000000`00008000 : nt!NtFreeVirtualMemory+0x5cafffff880`09f97c20 00000000`7785009a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`01e9e848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7785009aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> lmvm ntstart end module namefffff800`02c52000 fffff800`0322e000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. Drugi BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050510-18158-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c52000 PsLoadedModuleList = 0xfffff800`02e8fe50Debug session time: Wed May 5 16:57:51.666 2010 (GMT+2)System Uptime: 0 days 3:27:22.977Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa80031b9570, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa80031b9570Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: Metin2Mod.binCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d35ede to fffff80002cc2600STACK_TEXT: fffff880`0782c828 fffff800`02d35ede : 00000000`0000001a 00000000`00041790 fffffa80`031b9570 00000000`0000ffff : nt!KeBugCheckExfffff880`0782c830 fffff800`02cf5cc9 : 00000000`00000000 00000000`0fbb4fff ffffffff`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`0782c9f0 fffff800`02fdc170 : fffffa80`06d36180 0007ffff`00000000 fffffa80`06e8b260 fffffa80`06e8b260 : nt!MiRemoveMappedView+0xd9fffff880`0782cb10 fffff800`02fdc57b : 00000000`00000000 00000000`0bd80000 fffffa80`00000001 00000000`00008001 : nt!MiUnmapViewOfSection+0x1b0fffff880`0782cbd0 fffff800`02cc1853 : ffffffff`ffffffff 00000000`0008e310 fffffa80`05e3e880 00000000`00008000 : nt!NtUnmapViewOfSection+0x5ffffff880`0782cc20 00000000`77a5015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a5015aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02d35ede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------3: kd> lmvm ntstart end module namefffff800`02c52000 fffff800`0322e000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. Trzeci BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050710-27284-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e54e50Debug session time: Fri May 7 18:47:10.332 2010 (GMT+2)System Uptime: 0 days 4:01:20.082Loading Kernel Symbols.....................................................................................................................................................................Loading User SymbolsLoading unloaded module list..........******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41790, fffffa8000042060, ffff, 0}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33946 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa8000042060Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: explorer.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002cfaede to fffff80002c87600STACK_TEXT: fffff880`06d7b828 fffff800`02cfaede : 00000000`0000001a 00000000`00041790 fffffa80`00042060 00000000`0000ffff : nt!KeBugCheckExfffff880`06d7b830 fffff800`02cbacc9 : 00000000`00000000 00000000`16955fff fffffa80`00000000 fffff800`02c90000 : nt! ?? ::FNODOBFM::`string'+0x33946fffff880`06d7b9f0 fffff800`02fa1170 : fffffa80`06e7e110 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9fffff880`06d7bb10 fffff800`02fa157b : 00000000`00000000 00000000`15600000 fffffa80`00000001 fffffa80`067a6490 : nt!MiUnmapViewOfSection+0x1b0fffff880`06d7bbd0 fffff800`02c86853 : fffffa80`03c11060 fffff880`06d7bca0 fffffa80`073f2060 00000000`0951f870 : nt!NtUnmapViewOfSection+0x5ffffff880`06d7bc20 00000000`778a015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`065de858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778a015aSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+33946fffff800`02cfaede cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33946FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33946Followup: MachineOwner---------0: kd> lmvm ntstart end module namefffff800`02c17000 fffff800`031f3000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. Czwarty BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050810-16785-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e87e50Debug session time: Sat May 8 12:53:06.320 2010 (GMT+2)System Uptime: 0 days 0:29:36.005Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41284, 7fefbddc001, 0, fffff70001080000}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )Followup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: 000007fefbddc001Arg3: 0000000000000000Arg4: fffff70001080000Debugging Details:------------------BUGCHECK_STR: 0x1a_41284CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: SearchProtocolCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002d10df3 to fffff80002cba600STACK_TEXT: fffff880`077645f8 fffff800`02d10df3 : 00000000`0000001a 00000000`00041284 000007fe`fbddc001 00000000`00000000 : nt!KeBugCheckExfffff880`07764600 fffff800`02d2dc03 : fffffa80`00000000 00000000`000000e3 00000000`00000000 000007fe`ff590000 : nt! ?? ::FNODOBFM::`string'+0x4a83fffff880`07764640 fffff800`02cedcc9 : fffffa80`00000000 000007fe`fbebbfff 00000000`00000000 fffffa80`04d5c0c8 : nt! ?? ::FNODOBFM::`string'+0x3364bfffff880`07764800 fffff800`02c8d734 : ffffffff`ffffffff fffff880`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9fffff880`07764920 fffff800`02fa0c4f : fffff8a0`0991ea70 fffff880`07764c20 00000000`00000000 fffffa80`041a8820 : nt!MmCleanProcessAddressSpace+0x228fffff880`07764970 fffff800`02f794d1 : 00000000`00000000 fffff8a0`09a97601 000007ff`fffac000 00000000`00000000 : nt!PspExitThread+0x92ffffff880`07764a30 fffff800`02c970e3 : 00000000`00000000 fffffa80`05eb59d0 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1dfffff880`07764a60 fffff800`02c97520 : 00000000`77724298 fffff880`07764ae0 fffff800`02f795dc 00000000`00000001 : nt!KiDeliverApc+0x2ebfffff880`07764ae0 fffff800`02cb98f7 : fffffa80`041a8820 00000000`77724270 00000000`000000c0 fffff8a0`09a5a030 : nt!KiInitiateUserApc+0x70fffff880`07764c20 00000000`776717ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c00000000`0134f528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776717baSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+4a83fffff800`02d10df3 cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a83FOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfebFAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83Followup: MachineOwner---------2: kd> lmvm ntstart end module namefffff800`02c4a000 fffff800`03226000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\7E9A3CAB626845DE8E10816E3080A3B72\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: c:\symbols\ntoskrnl.exe\4B88CFEB5dc000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Sat Feb 27 08:55:23 2010 (4B88CFEB) CheckSum: 00545094 ImageSize: 005DC000 File version: 6.1.7600.16539 Product version: 6.1.7600.16539 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16539 FileVersion: 6.1.7600.16539 (win7_gdr.100226-1909) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. Piąty BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\050810-20389-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50Debug session time: Sat May 8 15:09:56.506 2010 (GMT+2)System Uptime: 0 days 1:19:01.192Loading Kernel Symbols..................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck FE, {8, 6, 6, fffffa80058cfb20}Probably caused by : usbhub.sys ( usbhub!UsbhHubProcessChangeWorker+ec )Followup: MachineOwner---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************BUGCODE_USB_DRIVER (fe)USB Driver bugcheck, first parameter is USB bugcheck code.Arguments:Arg1: 0000000000000008, USBBUGCODE_RESERVED_USBHUBArg2: 0000000000000006, USBHUB_TRAP_FATAL_TIMEOUTArg3: 0000000000000006, TimeoutCode: Timeout_PCE_Disable_Action - PortData->PortChangeListDone - Timeout trying to set Disable bitArg4: fffffa80058cfb20, TimeoutContext - PortDataDebugging Details:------------------CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xFEPROCESS_NAME: SystemCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff8800584a9ec to fffff80002cd8600STACK_TEXT: fffff880`031cbc18 fffff880`0584a9ec : 00000000`000000fe 00000000`00000008 00000000`00000006 00000000`00000006 : nt!KeBugCheckExfffff880`031cbc20 fffff800`02fd5827 : fffffa80`057de050 fffffa80`057b0230 ffffffff`dc3a58a0 fffff800`02e7d5f8 : usbhub!UsbhHubProcessChangeWorker+0xecfffff880`031cbc80 fffff800`02ce5861 : fffff800`02e7d500 fffff800`02fd5804 fffffa80`039e9b60 00000000`00000000 : nt!IopProcessWorkItem+0x23fffff880`031cbcb0 fffff800`02f7da86 : 0000056e`00000000 fffffa80`039e9b60 00000000`00000080 fffffa80`039d6040 : nt!ExpWorkerThread+0x111fffff880`031cbd40 fffff800`02cb6b06 : fffff880`02f63180 fffffa80`039e9b60 fffff880`02f6dfc0 0000056e`00000000 : nt!PspSystemThreadStartup+0x5afffff880`031cbd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16STACK_COMMAND: kbFOLLOWUP_IP: usbhub!UsbhHubProcessChangeWorker+ecfffff880`0584a9ec cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: usbhub!UsbhHubProcessChangeWorker+ecFOLLOWUP_NAME: MachineOwnerMODULE_NAME: usbhubIMAGE_NAME: usbhub.sysDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc2dFAILURE_BUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ecBUCKET_ID: X64_0xFE_usbhub!UsbhHubProcessChangeWorker+ecFollowup: MachineOwner---------2: kd> lmvm usbhubstart end module namefffff880`05838000 fffff880`05892000 usbhub (pdb symbols) c:\symbols\usbhub.pdb\295DCA65F67B44BF8DD26C3B6D89A6F71\usbhub.pdb Loaded symbol image file: usbhub.sys Mapped memory image file: c:\symbols\usbhub.sys\4A5BCC2D5a000\usbhub.sys Image path: \SystemRoot\system32\DRIVERS\usbhub.sys Image name: usbhub.sys Timestamp: Tue Jul 14 02:07:09 2009 (4A5BCC2D) CheckSum: 0005BB10 ImageSize: 0005A000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 2.0 Dll File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: usbhub.sys OriginalFilename: usbhub.sys ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: Default Hub Driver for USB LegalCopyright: © Microsoft Corporation. All rights reserved. Szósty BSOD: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\051010-18454-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 7600.16539.amd64fre.win7_gdr.100226-1909Machine Name:Kernel base = 0xfffff800`02c03000 PsLoadedModuleList = 0xfffff800`02e40e50Debug session time: Mon May 10 19:45:34.460 2010 (GMT+2)System Uptime: 0 days 1:03:41.145Loading Kernel Symbols.......................................................................................................................................................................Loading User SymbolsLoading unloaded module list..........******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {5100, fffff6fc80650f20, 2b4, 1}Probably caused by : win32k.sys ( win32k!AllocateObject+dd )Followup: MachineOwner---------3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000005100, The subtype of the bugcheck.Arg2: fffff6fc80650f20Arg3: 00000000000002b4Arg4: 0000000000000001Debugging Details:------------------BUGCHECK_STR: 0x1a_5100CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: explorer.exeCURRENT_IRQL: 0LAST_CONTROL_TRANSFER: from fffff80002ccd267 to fffff80002c73600STACK_TEXT: fffff880`07a3f718 fffff800`02ccd267 : 00000000`0000001a 00000000`00005100 fffff6fc`80650f20 00000000`000002b4 : nt!KeBugCheckExfffff880`07a3f720 fffff800`02c9e7fb : 00000000`00000698 fffff880`07a3f880 fffff900`c9e00000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0xae27fffff880`07a3f830 fffff800`02da4ceb : 00000000`00698000 00000000`00698000 00000000`00000021 fffff880`07a3fab0 : nt!MiAllocatePagedPoolPages+0x4bbfffff880`07a3f950 fffff800`02c85f60 : 00000000`00698000 fffff880`021c9cc0 00000000`00000021 00000000`00000000 : nt!MiAllocatePoolPages+0x8e2fffff880`07a3faa0 fffff800`02da7bfe : 00000000`00000000 00000000`00095f21 fffff800`00000020 fffff880`021c9cc0 : nt!ExpAllocateBigPool+0xb0fffff880`07a3fb90 fffff960`001828ed : 00000000`00003392 00000000`00000000 00000000`00000000 fffff960`001940d1 : nt!ExAllocatePoolWithTag+0x82efffff880`07a3fc80 fffff960`00183e0f : 00000000`00000001 fffff880`07a3fe18 00000000`00000001 fffff960`00194302 : win32k!AllocateObject+0xddfffff880`07a3fcc0 fffff960`00159f2f : fffff880`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SURFMEM::bCreateDIB+0x1fbfffff880`07a3fdb0 fffff960`00158fa5 : 00000000`2a010160 fffffa80`069cf4f0 00000000`00000000 00000000`00000001 : win32k!GreCreateDIBitmapReal+0x533fffff880`07a3fee0 fffff800`02c72853 : 00000000`2a010160 fffffa80`00000780 00000000`000004b0 00000000`00000002 : win32k!NtGdiCreateDIBitmapInternal+0x231fffff880`07a3ffb0 000007fe`fdb05e2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`001ed988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb05e2aSTACK_COMMAND: kbFOLLOWUP_IP: win32k!AllocateObject+ddfffff960`001828ed 488bd8 mov rbx,raxSYMBOL_STACK_INDEX: 6SYMBOL_NAME: win32k!AllocateObject+ddFOLLOWUP_NAME: MachineOwnerMODULE_NAME: win32kIMAGE_NAME: win32k.sysDEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0FAILURE_BUCKET_ID: X64_0x1a_5100_win32k!AllocateObject+ddBUCKET_ID: X64_0x1a_5100_win32k!AllocateObject+ddFollowup: MachineOwner---------3: kd> lmvm win32kstart end module namefffff960`000d0000 fffff960`003df000 win32k (pdb symbols) c:\symbols\win32k.pdb\A9F6403F14074E9D8A07D0AA6F0C1CFF2\win32k.pdb Loaded symbol image file: win32k.sys Mapped memory image file: c:\symbols\win32k.sys\4A5BC5E030f000\win32k.sys Image path: \SystemRoot\System32\win32k.sys Image name: win32k.sys Timestamp: Tue Jul 14 01:40:16 2009 (4A5BC5E0) CheckSum: 002FE623 ImageSize: 0030F000 File version: 6.1.7600.16385 Product version: 6.1.7600.16385 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: win32k.sys OriginalFilename: win32k.sys ProductVersion: 6.1.7600.16385 FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255) FileDescription: Multi-User Win32 Driver LegalCopyright: © Microsoft Corporation. All rights reserved. Załączam również: Dziennik zdarzeń oraz all mini-dump: http://www.przeklej....tx-0014cq2er6jo http://www.przeklej....mp-0014cq2ns5a5 http://www.przeklej....mp-0014cq2tk40i http://www.przeklej....mp-0014cq32hbq4 http://www.przeklej....mp-0014cq3e1agh http://www.przeklej....mp-0014cq42q7tb http://www.przeklej....mp-0014cq48q2mv HASŁO DO PLIKÓW: pomocy PROSZĘ NIECH MI KTOŚ POMOŻE !!! Ja już nie wiem co z tym zrobić ! Cytuj Udostępnij tę odpowiedź Odnośnik do odpowiedzi Udostępnij na innych stronach Więcej opcji udostępniania...
BuMeL Opublikowano 11 Maja 2010 Zgłoś Opublikowano 11 Maja 2010 Ja wiem co zrobić .... podać konfigurację sprzętową. Cytuj Udostępnij tę odpowiedź Odnośnik do odpowiedzi Udostępnij na innych stronach Więcej opcji udostępniania...
KoVol Opublikowano 11 Maja 2010 Zgłoś Opublikowano 11 Maja 2010 BugCheck 1A, {41790, fffffa80018c5490, ffff, 0}Najprawdopodobniej błąd sterowników. Ale w tych logach jest także dużo o ramach Sprawdzałeś je memtestem?? Linki nie działają. Cytuj Udostępnij tę odpowiedź Odnośnik do odpowiedzi Udostępnij na innych stronach Więcej opcji udostępniania...
ULLISSES Opublikowano 11 Maja 2010 Zgłoś Opublikowano 11 Maja 2010 Strasznie się rozpisałeś, ale nic z tego nie wynika. Nie zadałeś sobie trudu przeczytania przyklejonych tematów. Widziałbyś, że: a) trzeba podać konfigurację kompa b) sprawdzić pamięci c) sprawdzić zasilacz Cytuj Udostępnij tę odpowiedź Odnośnik do odpowiedzi Udostępnij na innych stronach Więcej opcji udostępniania...
Xemidra Opublikowano 11 Maja 2010 Zgłoś Opublikowano 11 Maja 2010 AMD Phenom II X4 955 Black Edit /3.2GHz, 125W, BOX, AM3/ Asus M4A77TD PRO A-Data 4GB (2x2GB) 1600MHz CL9 Gaming Asus Radeon HD5770 1GB ddr5 Western Digital Blue 500GB 7200rpm 16MB cache SATAII bequiet! PurePower L7 530W Cooler Master Elite 332 (Black) i czytnik kart pamięci Mode Com ze złączem USB, właśnie to w nim gdy był podłączony pendrive pokazał się jeden z BSOD tu są linki, sorry za tamte: przeklej.pl - bsod do 6 .evtx. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 050310 16489 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 050510 18158 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 050710 27284 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 050810 16785 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 050810 20389 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl przeklej.pl - 051010 18454 01 .dmp. Wrzucaj i ściągaj filmy, muzykę, obrazki i inne pliki z przeklej.pl [url="http://www.przeklej.pl/plik/051010-18454-01-dmp-0014cq48q2mv Cytuj Udostępnij tę odpowiedź Odnośnik do odpowiedzi Udostępnij na innych stronach Więcej opcji udostępniania...