none
Minidump RRS feed

  • Вопрос

  • Доброго дня!
    Помогите разобраться с проблемой на новой машине.

    Gigabyte EP45-DS3L
    E8400 E0
    Kingston KVR800D2N6/2G PC2-6400 CL6 x 2шт
    Leadtek PX9800GX2
    Thermaltake 600w Purepower RX W0144RE
    WD 500GB 5000AAKS
    SONY-NEC AD7203S

    Vista Ultimate x64 6.0.6.001 SP1
    Firefox 3.0.6
    Nod32 Smart Security 3.0.684.0
    Punto Switcher 3 (67)
    CoD4
    Sims2 :)

    Собственно уже три раза выпадала в бсод :(
    (системе неделя)
    последний раз возобновилась после спящего режима и при простое окло 10 минут вывалилась
    есть минидапы

    Первый:

    Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini021309-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
    Kernel base = 0xfffff800`01c05000 PsLoadedModuleList = 0xfffff800`01dcadb0
    Debug session time: Fri Feb 13 22:24:51.477 2009 (GMT+5)
    System Uptime: 0 days 3:20:10.415
    Loading Kernel Symbols
    .................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 4E, {2, 80000, 14ffff, 7576}

    Unable to load image \SystemRoot\system32\DRIVERS\eamon.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for eamon.sys
    *** ERROR: Module load completed but symbols could not be loaded for eamon.sys
    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+9044 )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000002, A list entry was corrupt
    Arg2: 0000000000080000, entry in list being removed
    Arg3: 000000000014ffff, highest physical page number
    Arg4: 0000000000007576, reference count of entry being removed

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x4E_2

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  wininit.exe

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff80001c170c4 to fffff80001c5a350

    STACK_TEXT: 
    fffffa60`095cc898 fffff800`01c170c4 : 00000000`0000004e 00000000`00000002 00000000`00080000 00000000`0014ffff : nt!KeBugCheckEx
    fffffa60`095cc8a0 fffff800`01c78c13 : fffffa60`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x9044
    fffffa60`095cc8e0 fffff800`01c6bee9 : fffff880`060a0000 fffff880`0a91b148 fffffa80`0719b080 fffffa80`07397200 : nt!MiFlushSectionInternal+0xaa5
    fffffa60`095ccae0 fffff800`01c6fb6f : 00000000`00000000 fffff980`04744900 00000000`00000000 fffffa60`00000000 : nt!MmFlushSection+0x129
    fffffa60`095ccba0 fffffa60`010c24ff : fffffa80`0712f7c0 00000000`00000000 fffffa80`00000000 fffffa60`095cccc8 : nt!CcFlushCache+0x840
    fffffa60`095ccc90 fffffa60`01094ec8 : fffff880`05fa3b50 fffff880`0609f140 fffffa80`07167480 fffff880`00000000 : Ntfs!NtfsFlushUserStream+0x18f
    fffffa60`095ccd20 fffffa60`010c3722 : fffffa80`07167480 fffffa80`06f6c180 00000000`00000001 fffffa60`00000000 : Ntfs!NtfsFlushVolume+0x298
    fffffa60`095cce40 fffffa60`010c3d8b : fffffa80`07167480 fffffa80`06037bd0 fffffa80`06037bd0 fffffa80`06f6c180 : Ntfs!NtfsCommonFlushBuffers+0x681
    fffffa60`095ccf10 fffffa60`00a09e17 : fffffa80`06037fb8 fffffa80`06037bd0 fffffa80`07167480 fffffa60`095ccf38 : Ntfs!NtfsFsdFlushBuffers+0x10b
    fffffa60`095ccf80 fffffa60`00a090dd : fffffa80`04e8bb00 fffffa80`046e28e0 fffffa80`0504d600 fffff800`01d3810e : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
    fffffa60`095ccff0 fffffa60`0bb3b019 : 00000000`00000000 fffffa60`095cd328 00000000`00000801 fffff800`01eeaa0c : fltmgr!FltpDispatch+0xcd
    fffffa60`095cd050 00000000`00000000 : fffffa60`095cd328 00000000`00000801 fffff800`01eeaa0c fffffa80`06037bd0 : eamon+0x4019
    fffffa60`095cd058 fffffa60`095cd328 : 00000000`00000801 fffff800`01eeaa0c fffffa80`06037bd0 fffff800`01ee73dc : 0x0
    fffffa60`095cd060 00000000`00000801 : fffff800`01eeaa0c fffffa80`06037bd0 fffff800`01ee73dc 00000000`00000000 : 0xfffffa60`095cd328
    fffffa60`095cd068 fffff800`01eeaa0c : fffffa80`06037bd0 fffff800`01ee73dc 00000000`00000000 fffffa60`095cd3b0 : 0x801
    fffffa60`095cd070 fffffa60`095cd1f0 : fffffa60`095cd100 fffffa60`095cd100 00000000`00000002 00000000`00000000 : nt!NtCreateFile+0x78
    fffffa60`095cd100 fffffa60`095cd100 : fffffa60`095cd100 00000000`00000002 00000000`00000000 00100003`00000000 : 0xfffffa60`095cd1f0
    fffffa60`095cd108 fffffa60`095cd100 : 00000000`00000002 00000000`00000000 00100003`00000000 fffffa80`c0000000 : 0xfffffa60`095cd100
    fffffa60`095cd110 00000000`00000002 : 00000000`00000000 00100003`00000000 fffffa80`c0000000 00000000`00000003 : 0xfffffa60`095cd100
    fffffa60`095cd118 00000000`00000000 : 00100003`00000000 fffffa80`c0000000 00000000`00000003 fffff800`00000001 : 0x2
    fffffa60`095cd120 00100003`00000000 : fffffa80`c0000000 00000000`00000003 fffff800`00000001 00000000`00000000 : 0x0
    fffffa60`095cd128 fffffa80`c0000000 : 00000000`00000003 fffff800`00000001 00000000`00000000 00000000`00000006 : 0x100003`00000000
    fffffa60`095cd130 00000000`00000003 : fffff800`00000001 00000000`00000000 00000000`00000006 00000000`00000004 : 0xfffffa80`c0000000
    fffffa60`095cd138 fffff800`00000001 : 00000000`00000000 00000000`00000006 00000000`00000004 00000000`00000001 : 0x3
    fffffa60`095cd140 00000000`00000000 : 00000000`00000006 00000000`00000004 00000000`00000001 00000000`00000000 : 0xfffff800`00000001
    fffffa60`095cd148 00000000`00000006 : 00000000`00000004 00000000`00000001 00000000`00000000 fffff800`01c59df3 : 0x0
    fffffa60`095cd150 00000000`00000004 : 00000000`00000001 00000000`00000000 fffff800`01c59df3 fffffa80`071a42d0 : 0x6
    fffffa60`095cd158 00000000`00000001 : 00000000`00000000 fffff800`01c59df3 fffffa80`071a42d0 00000000`00000003 : 0x4
    fffffa60`095cd160 00000000`00000000 : fffff800`01c59df3 fffffa80`071a42d0 00000000`00000003 fffffa80`07b05040 : 0x1
    fffffa60`095cd168 fffff800`01c59df3 : fffffa80`071a42d0 00000000`00000003 fffffa80`07b05040 fffffa80`046e28e0 : 0x0
    fffffa60`095cd170 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt! ?? ::FNODOBFM::`string'+9044
    fffff800`01c170c4 cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+9044

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

    FAILURE_BUCKET_ID:  X64_0x4E_2_nt!_??_::FNODOBFM::_string_+9044

    BUCKET_ID:  X64_0x4E_2_nt!_??_::FNODOBFM::_string_+9044

    Followup: MachineOwner
    ---------

    Второй:

    Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini021709-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
    Kernel base = 0xfffff800`01c5a000 PsLoadedModuleList = 0xfffff800`01e1fdb0
    Debug session time: Tue Feb 17 09:01:52.039 2009 (GMT+5)
    System Uptime: 0 days 20:16:45.465
    Loading Kernel Symbols
    .................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1A, {403, fffff68000018348, ef60000080001847, 0}

    Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+c306 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000000403, The subtype of the bugcheck.
    Arg2: fffff68000018348
    Arg3: ef60000080001847
    Arg4: 0000000000000000

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x1a_403

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  svchost.exe

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff80001d04d36 to fffff80001caf350

    STACK_TEXT: 
    fffffa60`0e4a3918 fffff800`01d04d36 : 00000000`0000001a 00000000`00000403 fffff680`00018348 ef600000`80001847 : nt!KeBugCheckEx
    fffffa60`0e4a3920 fffff800`01ce366a : 00000000`0306f201 fffff680`00018348 efb00000`801fc867 00000000`00000069 : nt! ?? ::FNODOBFM::`string'+0xc306
    fffffa60`0e4a3980 fffff800`01cee32e : 00000000`00000011 00000000`0306ffff fffffa80`00000000 fffff800`00000000 : nt!MiDeleteVirtualAddresses+0x32a
    fffffa60`0e4a3b10 fffff800`01caedf3 : ffffffff`ffffffff fffffa80`05ba6bb0 00000000`07dfe6a8 000007ff`00008000 : nt!NtFreeVirtualMemory+0xa1e
    fffffa60`0e4a3c20 00000000`770f5c5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`07dfe628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770f5c5a


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt! ?? ::FNODOBFM::`string'+c306
    fffff800`01d04d36 cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+c306

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

    FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+c306

    BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+c306

    Followup: MachineOwner
    ---------

    Третий:

    Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini021809-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
    Kernel base = 0xfffff800`01c54000 PsLoadedModuleList = 0xfffff800`01e19db0
    Debug session time: Wed Feb 18 09:09:14.752 2009 (GMT+5)
    System Uptime: 1 days 0:05:35.326
    Loading Kernel Symbols
    .................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1A, {8885, fffffa8000531060, fffffa8001800030, 502}

    Probably caused by : memory_corruption ( nt!MiRelinkStandbyPage+ec )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 0000000000008885, The subtype of the bugcheck.
    Arg2: fffffa8000531060
    Arg3: fffffa8001800030
    Arg4: 0000000000000502

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x1a_8885

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  svchost.exe

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff80001d2076c to fffff80001ca9350

    STACK_TEXT: 
    fffffa60`0adae8c8 fffff800`01d2076c : 00000000`0000001a 00000000`00008885 fffffa80`00531060 fffffa80`01800030 : nt!KeBugCheckEx
    fffffa60`0adae8d0 fffff800`01d74dbf : fffffa80`07941060 fffffa80`04ceb2a0 fffffa80`07941060 fffffa80`04ceb2a0 : nt!MiRelinkStandbyPage+0xec
    fffffa60`0adae910 fffff800`02042ce4 : 00000000`00000000 fffffa60`00000000 00000000`00000000 fffffa80`04cea000 : nt!MmSetPfnListPriorities+0x28f
    fffffa60`0adae980 fffff800`02082cb2 : fffffa60`1232b380 00000000`00000000 fffffa80`04cb5000 00000000`00000001 : nt!PfpPfnPrioRequest+0x84
    fffffa60`0adae9d0 fffff800`020953f8 : 00000000`00000000 00000000`00000004 fffffa60`0adaeca0 fffff800`01cac701 : nt!PfSetSuperfetchInformation+0x191
    fffffa60`0adaeab0 fffff800`01ca8df3 : fffffa80`07941060 00000000`044d9050 00000000`0ae5d980 00000000`00000000 : nt!NtSetSystemInformation+0x8fb
    fffffa60`0adaec20 00000000`77bc70ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`02dcef58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bc70ea


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!MiRelinkStandbyPage+ec
    fffff800`01d2076c cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt!MiRelinkStandbyPage+ec

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

    IMAGE_NAME:  memory_corruption

    FAILURE_BUCKET_ID:  X64_0x1a_8885_nt!MiRelinkStandbyPage+ec

    BUCKET_ID:  X64_0x1a_8885_nt!MiRelinkStandbyPage+ec

    Followup: MachineOwner
    ---------

    Заранее благодарю за помощь!

    18 февраля 2009 г. 17:20

Ответы

Все ответы