diss0ut utworzono 15 września 2009 utworzono 15 września 2009 Witam, ostatnio z niewiadomych przyczyn wyskakuje mi bluescreen albo komputer sam się resetuje.. wszystko było ok z 2tyg... lecz kilka dni temu wyskoczył mi "Krytyczny blad karty graficznej" lub coś podobnego i potem zaczęły mi się dziać takie problemy.. zrobiłem formata lecz i to nie pomogło... w "menadżerze urządzeń" miałem kilka procesów z żółtym wykrzyknikiem np. koprocesor <- zainstalowałem stary do niego lecz nie pomogło... jak mogę sprawdzić co się uszkodziło ? Dane PC: Athlon 7850BE M3N-H/HDMI HIS Radeon HD 4850 IceQ4 CHieftec GPS 500AB A
Psycholandia komentarz 15 września 2009 komentarz 15 września 2009 Do wykonania: http://www.forumpc.pl/index.php?showtopic=68409 http://www.forumpc.pl/index.php?showtopic=16074
diss0ut komentarz 16 września 2009 Autor komentarz 16 września 2009 (edytowane) http://img32.imageshack.us/i/dsc00187hu.jpg/ http://img32.imageshack.us/i/dsc00188tm.jpg/ tutaj są 2 zdjęcia z bluescreen i zauważyłem ze niekiedy komputer wogóle nie odpowiada na żadne sygnały tj. nawet na resetowanie.... dopiero odłączenie zasilania pomaga... i po tej czynności niekiedy nie ma sygnału dźwiękowego przy uruchamianiu kompa.... dopiero odłączenie zasilania na 5-10min i można ponownie uruchomić komputer. ******************************************************************************** * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, 80540441, aa099880, 0} Probably caused by : sr.sys ( sr!SrBackupFile+2b0 ) Followup: MachineOwner --------- 0: kd> l ^ Syntax error in 'l' 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 80540441, The address that the exception occurred at Arg3: aa099880, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo FAULTING_IP: nt!KiSystemService+0 80540441 6a00 push 0 TRAP_FRAME: aa099880 -- (.trap 0xffffffffaa099880) ErrCode = 00000002 eax=0000010b ebx=00000000 ecx=00000008 edx=aa099904 esi=00010000 edi=00010000 eip=80540441 esp=aa0998f4 ebp=aa09997c iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!KiSystemService: 80540441 6a00 push 0 Resetting default scope CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: svchost.exe LAST_CONTROL_TRANSFER: from 01ca362e to 80540441 STACK_TEXT: aa09997c 01ca362e 003a0000 80000868 aa099ae8 nt!KiSystemService WARNING: Frame IP not in any known module. Following frames may be wrong. aa0999ec 00ae6068 00000000 0000000c 00000002 0x1ca362e aa099a2c b9edd502 80000878 8a48d770 e137ac08 0xae6068 aa099ba8 b9edd87b 8a2970d8 8902c550 e13364e4 sr!SrBackupFile+0x2b0 aa099c10 b9edf5a9 8a2970d8 00000001 8902c550 sr!SrBackupFileAndLog+0x4b aa099c38 b9ee02c8 8a2970d8 00000001 8902c550 sr!SrHandleFileChange+0x59 aa099c84 b9ee6ebe 8a2970d8 00000001 8902c550 sr!SrHandleEvent+0x194 aa099cb0 804eeeb1 8a2970d8 e13364c0 8a17b758 sr!SrSetInformation+0xf2 aa099cc0 8057a2e7 aa099d64 0240fd58 80579dc4 nt!IopfCallDriver+0x31 aa099d48 8054060c 00000058 0240fd60 0240fd70 nt!NtSetInformationFile+0x523 aa099d48 7c90eb94 00000058 0240fd60 0240fd70 nt!KiFastCallEntry+0xfc 0240fd80 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb FOLLOWUP_IP: sr!SrBackupFile+2b0 b9edd502 89856cffffff mov dword ptr [ebp-94h],eax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: sr!SrBackupFile+2b0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: sr IMAGE_NAME: sr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 41107cde FAILURE_BUCKET_ID: 0x8E_sr!SrBackupFile+2b0 BUCKET_ID: 0x8E_sr!SrBackupFile+2b0 Followup: MachineOwner --------- to jest wynik z Minidump ale tylko jeden pliczek z 4 błędów błąd z dnia dzisiejszego ....: ******************************************************************************** * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {c0000005, 80549370, ba4e7bb0, ba4e78ac} Probably caused by : wdmaud.sys ( wdmaud!wdmaudUnmapBuffer+1a ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 80549370, The address that the exception occurred at Arg3: ba4e7bb0, Exception Record Address Arg4: ba4e78ac, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo FAULTING_IP: nt!MiReleaseSystemPtes+0 80549370 8bff mov edi,edi EXCEPTION_RECORD: ba4e7bb0 -- (.exr 0xffffffffba4e7bb0) ExceptionAddress: 80549370 (nt!MiReleaseSystemPtes) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 51ecab55 Attempt to read from address 51ecab55 CONTEXT: ba4e78ac -- (.cxr 0xffffffffba4e78ac) eax=00000000 ebx=c05d2f90 ecx=00002000 edx=45020000 esi=88eee008 edi=00000002 eip=80549370 esp=ba4e7c78 ebp=ba4e7c94 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!MiReleaseSystemPtes: 80549370 8bff mov edi,edi Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 51ecab55 READ_ADDRESS: 51ecab55 FOLLOWUP_IP: wdmaud!wdmaudUnmapBuffer+1a a9e3f646 56 push esi BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from 805085ce to 80549370 STACK_TEXT: ba4e7c74 805085ce c05d2f90 00000002 00000000 nt!MiReleaseSystemPtes ba4e7c94 80508616 ba5f2000 88eee008 88efcce8 nt!MmUnmapLockedPages+0x68 ba4e7cc8 a9e3f646 88eee008 8a533008 ba4e7ce4 nt!MmUnlockPages+0x2a ba4e7cd8 a9e3f87b 88eee008 ba4e7cf8 a9e3f850 wdmaud!wdmaudUnmapBuffer+0x1a ba4e7ce4 a9e3f850 88e53458 88f68f93 88f68e48 wdmaud!UnmapWriteContext+0x10 ba4e7cf8 a9e3f7d4 88e53458 00000000 88f68e48 wdmaud!FreeWriteContext+0x16 ba4e7d10 804f13e2 00000000 88f68e48 88e53458 wdmaud!wqWriteWaveCallBack+0x19 ba4e7d40 a92f0300 88f68e48 ba4e7d64 a92df8b3 nt!IopfCompleteRequest+0xa2 ba4e7d4c a92df8b3 88f68e48 88f746a8 88fa90c8 kmixer!MxCompleteRequest+0x20 ba4e7d64 b9d3880b 88fa9008 88f74688 80563720 kmixer!FreeDeadIrps+0x43 ba4e7d7c 80537757 88f74688 00000000 8a62c530 ks!WorkerThread+0x45 ba4e7dac 805ce794 88f74688 00000000 00000000 nt!ExpWorkerThread+0xef ba4e7ddc 805450ce 80537668 00000000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: wdmaud!wdmaudUnmapBuffer+1a FOLLOWUP_NAME: MachineOwner MODULE_NAME: wdmaud IMAGE_NAME: wdmaud.sys DEBUG_FLR_IMAGE_TIMESTAMP: 41107ee7 STACK_COMMAND: .cxr 0xffffffffba4e78ac ; kb FAILURE_BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 80549370, The address that the exception occurred at Arg3: ba4e7bb0, Exception Record Address Arg4: ba4e78ac, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo FAULTING_IP: nt!MiReleaseSystemPtes+0 80549370 8bff mov edi,edi EXCEPTION_RECORD: ba4e7bb0 -- (.exr 0xffffffffba4e7bb0) ExceptionAddress: 80549370 (nt!MiReleaseSystemPtes) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 51ecab55 Attempt to read from address 51ecab55 CONTEXT: ba4e78ac -- (.cxr 0xffffffffba4e78ac) eax=00000000 ebx=c05d2f90 ecx=00002000 edx=45020000 esi=88eee008 edi=00000002 eip=80549370 esp=ba4e7c78 ebp=ba4e7c94 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!MiReleaseSystemPtes: 80549370 8bff mov edi,edi Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 51ecab55 READ_ADDRESS: 51ecab55 FOLLOWUP_IP: wdmaud!wdmaudUnmapBuffer+1a a9e3f646 56 push esi BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from 805085ce to 80549370 STACK_TEXT: ba4e7c74 805085ce c05d2f90 00000002 00000000 nt!MiReleaseSystemPtes ba4e7c94 80508616 ba5f2000 88eee008 88efcce8 nt!MmUnmapLockedPages+0x68 ba4e7cc8 a9e3f646 88eee008 8a533008 ba4e7ce4 nt!MmUnlockPages+0x2a ba4e7cd8 a9e3f87b 88eee008 ba4e7cf8 a9e3f850 wdmaud!wdmaudUnmapBuffer+0x1a ba4e7ce4 a9e3f850 88e53458 88f68f93 88f68e48 wdmaud!UnmapWriteContext+0x10 ba4e7cf8 a9e3f7d4 88e53458 00000000 88f68e48 wdmaud!FreeWriteContext+0x16 ba4e7d10 804f13e2 00000000 88f68e48 88e53458 wdmaud!wqWriteWaveCallBack+0x19 ba4e7d40 a92f0300 88f68e48 ba4e7d64 a92df8b3 nt!IopfCompleteRequest+0xa2 ba4e7d4c a92df8b3 88f68e48 88f746a8 88fa90c8 kmixer!MxCompleteRequest+0x20 ba4e7d64 b9d3880b 88fa9008 88f74688 80563720 kmixer!FreeDeadIrps+0x43 ba4e7d7c 80537757 88f74688 00000000 8a62c530 ks!WorkerThread+0x45 ba4e7dac 805ce794 88f74688 00000000 00000000 nt!ExpWorkerThread+0xef ba4e7ddc 805450ce 80537668 00000000 00000000 nt!PspSystemThreadStartup+0x34 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: wdmaud!wdmaudUnmapBuffer+1a FOLLOWUP_NAME: MachineOwner MODULE_NAME: wdmaud IMAGE_NAME: wdmaud.sys DEBUG_FLR_IMAGE_TIMESTAMP: 41107ee7 STACK_COMMAND: .cxr 0xffffffffba4e78ac ; kb FAILURE_BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a BUCKET_ID: 0x7E_wdmaud!wdmaudUnmapBuffer+1a Followup: MachineOwner ---------
Psycholandia komentarz 16 września 2009 komentarz 16 września 2009 Wykonaj: http://support.microsoft.com/kb/325154/pl jeśli nie pomoże wywal i zainstaluj na nowo sterowniki od dźwięku
diss0ut komentarz 20 września 2009 Autor komentarz 20 września 2009 niestety nic nie pomogło... dalej to samo... teraz dostałem następujący błąd: ******************************************************************************** * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000000A, {a0008, 2, 0, 80520252} Probably caused by : memory_corruption Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000a0008, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 80520252, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 000a0008 CURRENT_IRQL: 2 FAULTING_IP: nt!MiCaptureWriteWatchDirtyBit+18 80520252 8b7008 mov esi,dword ptr [eax+8] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0xA PROCESS_NAME: CCC.exe LAST_CONTROL_TRANSFER: from 80520aea to 80520252 STACK_TEXT: a9e9ab04 80520aea 884ec9f0 7a381000 c03d1c08 nt!MiCaptureWriteWatchDirtyBit+0x18 a9e9ab24 805b64ca c03d1c08 234be867 80000000 nt!MiFlushTbAndCapture+0x9e a9e9ac00 805b697a 884ec9f0 885213f0 7a381000 nt!MiSetProtectionOnSection+0x612 a9e9accc 805b6ed8 884ec9f0 a9e9ad24 a9e9ad28 nt!MiProtectVirtualMemory+0x21c a9e9ad48 8054060c ffffffff 0125ea34 0125ea38 nt!NtProtectVirtualMemory+0x136 a9e9ad48 7c90eb94 ffffffff 0125ea34 0125ea38 nt!KiFastCallEntry+0xfc WARNING: Frame IP not in any known module. Following frames may be wrong. 0125ea28 00000000 00000000 00000000 00000000 0x7c90eb94 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 4 errors : !nt (80520241-80520271) 80520240 55 *42 81 c2 60 01 00 00 8b 02 3b c2 74 36 8b 4d UB..`.....;.t6.M 80520250 0c *42 8b 70 08 f6 46 16 80 74 0a 3b 48 0c 72 05 .B.p..F..t.;H.r. 80520260 3b *a0 10 76 08 8b 00 3b c2 75 e7 eb 16 8b 50 08 ;..v...;.u....P. 80520270 8b *42 c1 e2 0c 2b ca c1 f9 0c 51 ff 70 14 e8 e9 .B...+....Q.p... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE BUCKET_ID: MEMORY_CORRUPTION_STRIDE Followup: memory_corruption --------- Proszę o szybką pomoc !
Psycholandia komentarz 20 września 2009 komentarz 20 września 2009 Nagraj na płytę ten program: http://www.dobreprogramy.pl/Memtest,Program,Windows,12556.html, zresetuj komputer, klik na F11, uruchom program z płyty i zostaw na noc, niech przetestuje pamięci
diss0ut komentarz 22 września 2009 Autor komentarz 22 września 2009 podczas sprawdzania RAM'ow dostałem błąd Unexpected Intterupt - Halling cpu0 mam zdjęcie na fonie lecz USB zepsute i nie mam jak wrzucić na hosting.... dodam że na początku miałem 4gb ramu oddałem do servisu gość stwierdził że stara kość padła było ok 5-6h znowu crash więc wyciągnąłem drugą starą kość i dalej to samo..... jest prawdopodobne aby w ciągu 3-4 tyg od upgred'a pc padły 4gb ramu ?mam pytanie czy można sprawdzić jakimś programem czy są uszkodzone wejśćia do pamięci RAM ?
Psycholandia komentarz 23 września 2009 komentarz 23 września 2009 Jakie to w ogóle kości pamięci? Timingi masz ustawione w biosie na standardowe? Jeśli nie przestaw. Spróbuj przeczyścić styki pamięci alkoholem i wejścia delikatnie również. Jeśli nie pomoże to zostaje opcja, że mógł dać wadliwą pamięć znów i musisz oddać na gwarancję. [quote]mam pytanie czy można sprawdzić jakimś programem czy są uszkodzone wejścia do pamięci RAM ? [/quote] Nie ma. Ale możesz pożyczyć od kogoś kostkę ramu inną i przetestować czy będzie wywalać błąd.
diss0ut komentarz 27 września 2009 Autor komentarz 27 września 2009 ok problem rozwiązany jakimś cudem padło 3gb ramu... 1gb nie uszkodzone a wejścia też sprawne Dzieki za pomoc pozdrawiam diss0ut
Wciąż szukasz rozwiązania problemu? Napisz teraz na forum!
Możesz zadać pytanie bez konieczności rejestracji - wystarczy, że wypełnisz formularz.