hommasin uuden näyttiksen ja sen tullu bsod:ita jatkuvasti kun pelaa jotain tässä debugger tietoo teille: Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\Mini052310-02.dmp] Mini Kernel Dump File: Only registers and stack trace are available WARNING: Whitespace at start of path element Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) UP Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6002.18209.x86fre.vistasp2_gdr.100218-0019 Machine Name: Kernel base = 0x8243c000 PsLoadedModuleList = 0x82553c70 Debug session time: Sun May 23 17:50:51.786 2010 (GMT+3) System Uptime: 0 days 4:43:46.439 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {19a4, 1b, 0, 824e70d2} Probably caused by : ntkrpamp.exe ( nt!KiIpiSendPacket+5a ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000019a4, memory referenced Arg2: 0000001b, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 824e70d2, address which referenced memory Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'EagleNT' and 'EagleNT.sys' overlap READ_ADDRESS: GetPointerFromAddress: unable to read from 82573868 Unable to read MiSystemVaType memory at 82553420 000019a4 CURRENT_IRQL: 1b FAULTING_IP: nt!KiIpiSendPacket+5a 824e70d2 8b86a4190000 mov eax,dword ptr [esi+19A4h] CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: avgnt.exe TRAP_FRAME: 8911ba10 -- (.trap 0xffffffff8911ba10) ErrCode = 00000000 eax=825335f0 ebx=825335f0 ecx=00000000 edx=82534920 esi=00000000 edi=82573a04 eip=824e70d2 esp=8911ba84 ebp=8911bab4 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!KiIpiSendPacket+0x5a: 824e70d2 8b86a4190000 mov eax,dword ptr [esi+19A4h] ds:0023:000019a4=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 824e70d2 to 82489fd9 STACK_TEXT: 8911ba10 824e70d2 badb0d00 82534920 82410668 nt!KiTrap0E+0x2e1 8911ba8c 82480b9d 0000f06a 824ed8f3 00000000 nt!KiIpiSendPacket+0x5a 8911bab4 824bf3a7 82533600 00000001 00000000 nt!KeFlushMultipleRangeTb+0xb9 8911bc44 824bebaf 870f5ca8 00000001 8911bc80 nt!MiAgeWorkingSet+0x3b0 8911bc98 824be5e4 00000002 8911bcb4 00000001 nt!MiProcessWorkingSets+0x1ff 8911bcd8 82470c78 00000000 8488bb78 00000000 nt!MmWorkingSetManager+0x199 8911bd7c 82611c42 00000000 3053cfa2 00000000 nt!KeBalanceSetManager+0x12a 8911bdc0 8247af4e 82470b4e 00000000 00000000 nt!PspSystemThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiIpiSendPacket+5a 824e70d2 8b86a4190000 mov eax,dword ptr [esi+19A4h] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiIpiSendPacket+5a FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b7d1e08 FAILURE_BUCKET_ID: 0xA_nt!KiIpiSendPacket+5a BUCKET_ID: 0xA_nt!KiIpiSendPacket+5a Followup: MachineOwner ---------
olen ja tänään pistin winukan uusiksi jos se nyt auttaa jos ei auta niin sitte testaan näyttistä jossain muussa koneessa
Tommonen tuli vasta Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\Mini060710-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available WARNING: Whitespace at end of path element Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6002.18209.x86fre.vistasp2_gdr.100218-0019 Machine Name: Kernel base = 0x81a40000 PsLoadedModuleList = 0x81b57c70 Debug session time: Mon Jun 7 19:14:06.231 2010 (UTC + 3:00) System Uptime: 0 days 1:40:56.360 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {883bc764, 1, 81ab6760, 0} Probably caused by : memory_corruption ( nt!MiOutPageSingleKernelStack+d1 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: 883bc764, memory referenced. Arg2: 00000001, value 0 = read operation, 1 = write operation. Arg3: 81ab6760, If non-zero, the instruction address which referenced the bad memory address. Arg4: 00000000, (reserved) Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'EagleNT' and 'EagleNT.sys' overlap WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81b77868 Unable to read MiSystemVaType memory at 81b57420 883bc764 FAULTING_IP: nt!MiOutPageSingleKernelStack+d1 81ab6760 8948fc mov dword ptr [eax-4],ecx MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: System CURRENT_IRQL: 0 TRAP_FRAME: 88393b94 -- (.trap 0xffffffff88393b94) ErrCode = 00000002 eax=883bc768 ebx=c0441de0 ecx=8473c518 edx=8473c518 esi=c0441de0 edi=88393c50 eip=81ab6760 esp=88393c08 ebp=88393c38 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!MiOutPageSingleKernelStack+0xd1: 81ab6760 8948fc mov dword ptr [eax-4],ecx ds:0023:883bc764=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 81a8ddd4 to 81ad838d STACK_TEXT: 88393b7c 81a8ddd4 00000001 883bc764 00000000 nt!MmAccessFault+0x10a 88393b7c 81ab6760 00000001 883bc764 00000000 nt!KiTrap0E+0xdc 88393c38 81a7f047 8473c518 88393c50 88393c9c nt!MiOutPageSingleKernelStack+0xd1 88393c84 81ab69c5 8473c518 81ab668f 88393c9c nt!KeEnumerateKernelStackSegments+0x7a 88393d2c 81a71683 8473c518 00000000 83a8ed78 nt!MmOutPageKernelStack+0x42 88393d70 81a752e4 00000000 88393dc0 81c15c42 nt!KiOutSwapKernelStacks+0x187 88393d7c 81c15c42 00000000 db08cf96 00000000 nt!KeSwapProcessOrStack+0x4b 88393dc0 81a7ef4e 81a75299 00000000 00000000 nt!PspSystemThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiOutPageSingleKernelStack+d1 81ab6760 8948fc mov dword ptr [eax-4],ecx SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!MiOutPageSingleKernelStack+d1 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4b7d1e08 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x50_nt!MiOutPageSingleKernelStack+d1 BUCKET_ID: 0x50_nt!MiOutPageSingleKernelStack+d1 Followup: MachineOwner --------- 1: kd> .trap 0xffffffff88393b94 ErrCode = 00000002 eax=883bc768 ebx=c0441de0 ecx=8473c518 edx=8473c518 esi=c0441de0 edi=88393c50 eip=81ab6760 esp=88393c08 ebp=88393c38 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!MiOutPageSingleKernelStack+0xd1: 81ab6760 8948fc mov dword ptr [eax-4],ecx ds:0023:883bc764=???????? 1: kd> lmvm nt start end module name 81a40000 81df9000 nt (pdb symbols) c:\symbols\ntkrpamp.pdb\111A8057667E4AFE837AD1E723526E692\ntkrpamp.pdb Loaded symbol image file: ntkrpamp.exe Mapped memory image file: c:\symbols\ntkrnlpa.exe\4B7D1E083b9000\ntkrnlpa.exe Image path: ntkrpamp.exe Image name: ntkrpamp.exe Timestamp: Thu Feb 18 13:01:28 2010 (4B7D1E08) CheckSum: 0037026D ImageSize: 003B9000 File version: 6.0.6002.18209 Product version: 6.0.6002.18209 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrpamp.exe OriginalFilename: ntkrpamp.exe ProductVersion: 6.0.6002.18209 FileVersion: 6.0.6002.18209 (vistasp2_gdr.100218-0019) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. ihme juttu kun formatointi ei auttanu, oisko näistä kahdesta apuja ongelman ratkaisuun. En ole vieläkään päässy testaamaan näyttistä kun kaikkilla ei ole samaa väylää koneessa ja tosiiaan oon muistitkin testannu mem testillä joten se ei ainaakaan niistä ole kiinni.