x-kom hosting

[Rozwiązany] Resetowanie oraz bluescreen, błąd karty graficznej

diss0ut
utworzono
utworzono

Witam,

ostatnio z niewiadomych przyczyn wyskakuje mi bluescreen albo komputer sam się resetuje..

wszystko było ok z 2tyg... lecz kilka dni temu wyskoczył mi "Krytyczny blad karty graficznej" lub coś podobnego i potem zaczęły mi się dziać takie problemy..

zrobiłem formata lecz i to nie pomogło...

w "menadżerze urządzeń" miałem kilka procesów z żółtym wykrzyknikiem np.

koprocesor <- zainstalowałem stary do niego lecz nie pomogło...

jak mogę sprawdzić co się uszkodziło ?

Dane PC:

Athlon 7850BE

M3N-H/HDMI

HIS Radeon HD 4850 IceQ4

CHieftec GPS 500AB A

diss0ut
komentarz
komentarz (edytowane)

http://img32.imageshack.us/i/dsc00187hu.jpg/

http://img32.imageshack.us/i/dsc00188tm.jpg/

tutaj są 2 zdjęcia z bluescreen

i zauważyłem ze niekiedy komputer wogóle nie odpowiada na żadne sygnały tj. nawet na resetowanie....

dopiero odłączenie zasilania pomaga...

i po tej czynności niekiedy nie ma sygnału dźwiękowego przy uruchamianiu kompa....

dopiero odłączenie zasilania na 5-10min i można ponownie uruchomić komputer.

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 80540441, aa099880, 0}

Probably caused by : sr.sys ( sr!SrBackupFile+2b0 )

Followup: MachineOwner

---------

0: kd> l

^ Syntax error in 'l'

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003. This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG. This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG. This will let us see why this breakpoint is

happening.

Arguments:

Arg1: c0000005, The exception code that was not handled

Arg2: 80540441, The address that the exception occurred at

Arg3: aa099880, Trap Frame

Arg4: 00000000

Debugging Details:

------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo

FAULTING_IP:

nt!KiSystemService+0

80540441 6a00 push 0

TRAP_FRAME: aa099880 -- (.trap 0xffffffffaa099880)

ErrCode = 00000002

eax=0000010b ebx=00000000 ecx=00000008 edx=aa099904 esi=00010000 edi=00010000

eip=80540441 esp=aa0998f4 ebp=aa09997c iopl=0 nv up ei pl zr na pe nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246

nt!KiSystemService:

80540441 6a00 push 0

Resetting default scope

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x8E

PROCESS_NAME: svchost.exe

LAST_CONTROL_TRANSFER: from 01ca362e to 80540441

STACK_TEXT:

aa09997c 01ca362e 003a0000 80000868 aa099ae8 nt!KiSystemService

WARNING: Frame IP not in any known module. Following frames may be wrong.

aa0999ec 00ae6068 00000000 0000000c 00000002 0x1ca362e

aa099a2c b9edd502 80000878 8a48d770 e137ac08 0xae6068

aa099ba8 b9edd87b 8a2970d8 8902c550 e13364e4 sr!SrBackupFile+0x2b0

aa099c10 b9edf5a9 8a2970d8 00000001 8902c550 sr!SrBackupFileAndLog+0x4b

aa099c38 b9ee02c8 8a2970d8 00000001 8902c550 sr!SrHandleFileChange+0x59

aa099c84 b9ee6ebe 8a2970d8 00000001 8902c550 sr!SrHandleEvent+0x194

aa099cb0 804eeeb1 8a2970d8 e13364c0 8a17b758 sr!SrSetInformation+0xf2

aa099cc0 8057a2e7 aa099d64 0240fd58 80579dc4 nt!IopfCallDriver+0x31

aa099d48 8054060c 00000058 0240fd60 0240fd70 nt!NtSetInformationFile+0x523

aa099d48 7c90eb94 00000058 0240fd60 0240fd70 nt!KiFastCallEntry+0xfc

0240fd80 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

FOLLOWUP_IP:

sr!SrBackupFile+2b0

b9edd502 89856cffffff mov dword ptr [ebp-94h],eax

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: sr!SrBackupFile+2b0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: sr

IMAGE_NAME: sr.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107cde

FAILURE_BUCKET_ID: 0x8E_sr!SrBackupFile+2b0

BUCKET_ID: 0x8E_sr!SrBackupFile+2b0

Followup: MachineOwner

---------

to jest wynik z Minidump ale tylko jeden pliczek z 4 błędów

błąd z dnia dzisiejszego ....:

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 80549370, ba4e7bb0, ba4e78ac}

Probably caused by : wdmaud.sys ( wdmaud!wdmaudUnmapBuffer+1a )

Followup: MachineOwner

---------

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003. This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG. This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG. This will let us see why this breakpoint is

happening.

Arguments:

Arg1: c0000005, The exception code that was not handled

Arg2: 80549370, The address that the exception occurred at

Arg3: ba4e7bb0, Exception Record Address

Arg4: ba4e78ac, Context Record Address

Debugging Details:

------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo

FAULTING_IP:

nt!MiReleaseSystemPtes+0

80549370 8bff mov edi,edi

EXCEPTION_RECORD: ba4e7bb0 -- (.exr 0xffffffffba4e7bb0)

ExceptionAddress: 80549370 (nt!MiReleaseSystemPtes)

ExceptionCode: c0000005 (Access violation)

ExceptionFlags: 00000000

NumberParameters: 2

Parameter[0]: 00000000

Parameter[1]: 51ecab55

Attempt to read from address 51ecab55

CONTEXT: ba4e78ac -- (.cxr 0xffffffffba4e78ac)

eax=00000000 ebx=c05d2f90 ecx=00002000 edx=45020000 esi=88eee008 edi=00000002

eip=80549370 esp=ba4e7c78 ebp=ba4e7c94 iopl=0 nv up ei pl zr na pe nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246

nt!MiReleaseSystemPtes:

80549370 8bff mov edi,edi

Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo

EXCEPTION_PARAMETER1: 00000000

EXCEPTION_PARAMETER2: 51ecab55

READ_ADDRESS: 51ecab55

FOLLOWUP_IP:

wdmaud!wdmaudUnmapBuffer+1a

a9e3f646 56 push esi

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from 805085ce to 80549370

STACK_TEXT:

ba4e7c74 805085ce c05d2f90 00000002 00000000 nt!MiReleaseSystemPtes

ba4e7c94 80508616 ba5f2000 88eee008 88efcce8 nt!MmUnmapLockedPages+0x68

ba4e7cc8 a9e3f646 88eee008 8a533008 ba4e7ce4 nt!MmUnlockPages+0x2a

ba4e7cd8 a9e3f87b 88eee008 ba4e7cf8 a9e3f850 wdmaud!wdmaudUnmapBuffer+0x1a

ba4e7ce4 a9e3f850 88e53458 88f68f93 88f68e48 wdmaud!UnmapWriteContext+0x10

ba4e7cf8 a9e3f7d4 88e53458 00000000 88f68e48 wdmaud!FreeWriteContext+0x16

ba4e7d10 804f13e2 00000000 88f68e48 88e53458 wdmaud!wqWriteWaveCallBack+0x19

ba4e7d40 a92f0300 88f68e48 ba4e7d64 a92df8b3 nt!IopfCompleteRequest+0xa2

ba4e7d4c a92df8b3 88f68e48 88f746a8 88fa90c8 kmixer!MxCompleteRequest+0x20

ba4e7d64 b9d3880b 88fa9008 88f74688 80563720 kmixer!FreeDeadIrps+0x43

ba4e7d7c 80537757 88f74688 00000000 8a62c530 ks!WorkerThread+0x45

ba4e7dac 805ce794 88f74688 00000000 00000000 nt!ExpWorkerThread+0xef

ba4e7ddc 805450ce 80537668 00000000 00000000 nt!PspSystemThreadStartup+0x34

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: wdmaud!wdmaudUnmapBuffer+1a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: wdmaud

IMAGE_NAME: wdmaud.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107ee7

STACK_COMMAND: .cxr 0xffffffffba4e78ac ; kb

FAILURE_BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a

BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a

Followup: MachineOwner

---------

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)

This is a very common bugcheck. Usually the exception address pinpoints

the driver/function that caused the problem. Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003. This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG. This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG. This will let us see why this breakpoint is

happening.

Arguments:

Arg1: c0000005, The exception code that was not handled

Arg2: 80549370, The address that the exception occurred at

Arg3: ba4e7bb0, Exception Record Address

Arg4: ba4e78ac, Context Record Address

Debugging Details:

------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo

FAULTING_IP:

nt!MiReleaseSystemPtes+0

80549370 8bff mov edi,edi

EXCEPTION_RECORD: ba4e7bb0 -- (.exr 0xffffffffba4e7bb0)

ExceptionAddress: 80549370 (nt!MiReleaseSystemPtes)

ExceptionCode: c0000005 (Access violation)

ExceptionFlags: 00000000

NumberParameters: 2

Parameter[0]: 00000000

Parameter[1]: 51ecab55

Attempt to read from address 51ecab55

CONTEXT: ba4e78ac -- (.cxr 0xffffffffba4e78ac)

eax=00000000 ebx=c05d2f90 ecx=00002000 edx=45020000 esi=88eee008 edi=00000002

eip=80549370 esp=ba4e7c78 ebp=ba4e7c94 iopl=0 nv up ei pl zr na pe nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246

nt!MiReleaseSystemPtes:

80549370 8bff mov edi,edi

Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo

EXCEPTION_PARAMETER1: 00000000

EXCEPTION_PARAMETER2: 51ecab55

READ_ADDRESS: 51ecab55

FOLLOWUP_IP:

wdmaud!wdmaudUnmapBuffer+1a

a9e3f646 56 push esi

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from 805085ce to 80549370

STACK_TEXT:

ba4e7c74 805085ce c05d2f90 00000002 00000000 nt!MiReleaseSystemPtes

ba4e7c94 80508616 ba5f2000 88eee008 88efcce8 nt!MmUnmapLockedPages+0x68

ba4e7cc8 a9e3f646 88eee008 8a533008 ba4e7ce4 nt!MmUnlockPages+0x2a

ba4e7cd8 a9e3f87b 88eee008 ba4e7cf8 a9e3f850 wdmaud!wdmaudUnmapBuffer+0x1a

ba4e7ce4 a9e3f850 88e53458 88f68f93 88f68e48 wdmaud!UnmapWriteContext+0x10

ba4e7cf8 a9e3f7d4 88e53458 00000000 88f68e48 wdmaud!FreeWriteContext+0x16

ba4e7d10 804f13e2 00000000 88f68e48 88e53458 wdmaud!wqWriteWaveCallBack+0x19

ba4e7d40 a92f0300 88f68e48 ba4e7d64 a92df8b3 nt!IopfCompleteRequest+0xa2

ba4e7d4c a92df8b3 88f68e48 88f746a8 88fa90c8 kmixer!MxCompleteRequest+0x20

ba4e7d64 b9d3880b 88fa9008 88f74688 80563720 kmixer!FreeDeadIrps+0x43

ba4e7d7c 80537757 88f74688 00000000 8a62c530 ks!WorkerThread+0x45

ba4e7dac 805ce794 88f74688 00000000 00000000 nt!ExpWorkerThread+0xef

ba4e7ddc 805450ce 80537668 00000000 00000000 nt!PspSystemThreadStartup+0x34

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: wdmaud!wdmaudUnmapBuffer+1a

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: wdmaud

IMAGE_NAME: wdmaud.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 41107ee7

STACK_COMMAND: .cxr 0xffffffffba4e78ac ; kb

FAILURE_BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a

BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a

Followup: MachineOwner

---------

Psycholandia
komentarz
komentarz

Wykonaj: http://support.microsoft.com/kb/325154/pl

jeśli nie pomoże wywal i zainstaluj na nowo sterowniki od dźwięku

diss0ut
komentarz
komentarz

niestety nic nie pomogło...

dalej to samo...

teraz dostałem następujący błąd:

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {a0008, 2, 0, 80520252}

Probably caused by : memory_corruption

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd>

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 000a0008, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 80520252, address which referenced memory

Debugging Details:

------------------

READ_ADDRESS: 000a0008

CURRENT_IRQL: 2

FAULTING_IP:

nt!MiCaptureWriteWatchDirtyBit+18

80520252 8b7008 mov esi,dword ptr [eax+8]

CUSTOMER_CRASH_COUNT: 2

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: 0xA

PROCESS_NAME: CCC.exe

LAST_CONTROL_TRANSFER: from 80520aea to 80520252

STACK_TEXT:

a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18

a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e

a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612

a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c

a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136

a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc

WARNING: Frame IP not in any known module. Following frames may be wrong.

0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94

STACK_COMMAND: kb

CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt

4 errors : !nt (80520241-80520271)

80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M

80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r.

80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P.

80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p...

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

Followup: memory_corruption

---------

Proszę o szybką pomoc !

Psycholandia
komentarz
komentarz

Nagraj na płytę ten program: http://www.dobreprogramy.pl/Memtest,Program,Windows,12556.html, zresetuj komputer, klik na F11, uruchom program z płyty i zostaw na noc, niech przetestuje pamięci

diss0ut
komentarz
komentarz

podczas sprawdzania RAM'ow dostałem błąd Unexpected Intterupt - Halling cpu0 mam zdjęcie na fonie lecz USB zepsute i nie mam jak wrzucić na hosting....


dodam że na początku miałem 4gb ramu oddałem do servisu gość stwierdził że stara kość padła było ok 5-6h znowu crash więc wyciągnąłem drugą starą kość i dalej to samo.....

jest prawdopodobne aby w ciągu 3-4 tyg od upgred'a pc padły 4gb ramu ?

mam pytanie czy można sprawdzić jakimś programem czy są uszkodzone wejśćia do pamięci RAM ?

Psycholandia
komentarz
komentarz

Jakie to w ogóle kości pamięci? Timingi masz ustawione w biosie na standardowe? Jeśli nie przestaw.
Spróbuj przeczyścić styki pamięci alkoholem i wejścia delikatnie również.
Jeśli nie pomoże to zostaje opcja, że mógł dać wadliwą pamięć znów i musisz oddać na gwarancję.
[quote]mam pytanie czy można sprawdzić jakimś programem czy są uszkodzone wejścia do pamięci RAM ? [/quote]
Nie ma. Ale możesz pożyczyć od kogoś kostkę ramu inną i przetestować czy będzie wywalać błąd.

diss0ut
komentarz
komentarz

ok problem rozwiązany :D


jakimś cudem padło 3gb ramu...

1gb nie uszkodzone a wejścia też sprawne


Dzieki za pomoc






pozdrawiam
diss0ut

Wciąż szukasz rozwiązania problemu? Napisz teraz na forum!

Możesz zadać pytanie bez konieczności rejestracji - wystarczy, że wypełnisz formularz.

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Strona wykorzystuje pliki cookies w celu prawidłowego świadczenia usług i wygody użytkowników. Warunki przechowywania i dostępu do plików cookies możesz zmienić w ustawieniach przeglądarki.