Piszę szybo, bo w każdej chwili może mi wywalić.
Otóż nie wiem skąd, zaczęły mi się pojawiać BSOD'y podczas normalnego użytkowania kompa(nie grania).
Oto zrzuty:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072112-27892-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symsols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03048e50 Debug session time: Sat Jul 21 18:15:38.657 2012 (GMT+2) System Uptime: 0 days 0:06:40.984 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8a00af66000, 0, fffff80003141079, 0} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiCompressRelocations+70 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a00af66000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80003141079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b30e0 fffff8a00af66000 FAULTING_IP: nt!MiCompressRelocations+70 fffff800`03141079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800a6a9040 -- (.trap 0xfffff8800a6a9040) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003141079 rsp=fffff8800a6a91d0 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a00af66000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`03141079 410fb701 movzx eax,word ptr [r9] ds:9100:fffff8a0`0af66000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002efc1e4 to fffff80002e7cf00 STACK_TEXT: fffff880`0a6a8ed8 fffff800`02efc1e4 : 00000000`00000050 fffff8a0`0af66000 00000000`00000000 fffff880`0a6a9040 : nt!KeBugCheckEx fffff880`0a6a8ee0 fffff800`02e7afee : 00000000`00000000 00000000`00000003 fffffa80`04724300 fffff8a0`0aef8824 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`0a6a9040 fffff800`03141079 : 00000000`01000000 fffff800`03141461 fffffa80`0420f300 fffff800`031415a4 : nt!KiPageFault+0x16e fffff880`0a6a91d0 fffff800`0313f932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`0a6a9220 fffff800`031755d1 : fffff8a0`0ac7e000 fffff880`0a6a9430 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`0a6a9390 fffff800`0316a893 : fffff880`0a6a95f0 00000000`00000000 fffff880`0a6a9698 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`0a6a95a0 fffff800`032d9573 : 00000000`00000000 fffff8a0`0a28ed88 00000000`00000000 00000000`00000001 : nt!NtCreateSection+0x162 fffff880`0a6a9620 fffff800`032d9b01 : 00000000`00000000 fffff8a0`0a28ed88 fffffa80`04cfc510 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x163 fffff880`0a6a9710 fffff800`032e1c1e : fffff8a0`00000000 fffff8a0`00000004 fffff8a0`00000015 00000000`00000001 : nt!PfpPrefetchFilesTrickle+0x121 fffff880`0a6a9810 fffff800`032e27b7 : 00000000`00000000 fffff880`0a6a9ca0 fffff880`0a6a9a08 fffff8a0`0176b060 : nt!PfpPrefetchRequestPerform+0x30e fffff880`0a6a9960 fffff800`032eed8e : fffff880`0a6a9a08 00000000`00000001 fffffa80`069e8930 00000000`00000000 : nt!PfpPrefetchRequest+0x176 fffff880`0a6a99d0 fffff800`032f34be : 00000000`00000000 00000000`00e6f810 00000000`0000004f 00000000`00000001 : nt!PfSetSuperfetchInformation+0x1ad fffff880`0a6a9ab0 fffff800`02e7c153 : fffffa80`06c59b60 00000000`00000000 00000000`00000001 00000000`00000001 : nt!NtSetSystemInformation+0xb91 fffff880`0a6a9c20 00000000`771115aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`00e6f7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771115aa STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`03141079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 Followup: MachineOwner ---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072112-28142-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symsols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02e4d000 PsLoadedModuleList = 0xfffff800`0308ae50 Debug session time: Sat Jul 21 18:07:02.387 2012 (GMT+2) System Uptime: 0 days 0:02:40.838 Loading Kernel Symbols ............................................................... ................................................................ ................................ Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8a004966000, 0, fffff80003183079, 0} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiCompressRelocations+70 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a004966000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80003183079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030f50e0 fffff8a004966000 FAULTING_IP: nt!MiCompressRelocations+70 fffff800`03183079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: explorer.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800976d5d0 -- (.trap 0xfffff8800976d5d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003183079 rsp=fffff8800976d760 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a004966000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`03183079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`04966000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002f3e1e4 to fffff80002ebef00 STACK_TEXT: fffff880`0976d468 fffff800`02f3e1e4 : 00000000`00000050 fffff8a0`04966000 00000000`00000000 fffff880`0976d5d0 : nt!KeBugCheckEx fffff880`0976d470 fffff800`02ebcfee : 00000000`00000000 00000000`00000003 fffff800`03074a00 fffff800`02ee5e00 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`0976d5d0 fffff800`03183079 : fffffa80`060b7de0 fffff800`03183461 fffffa80`060b7de0 fffff800`031835a4 : nt!KiPageFault+0x16e fffff880`0976d760 fffff800`03181932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`0976d7b0 fffff800`031b75d1 : fffff8a0`0286a000 fffff880`0976d9c0 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`0976d920 fffff800`031ac893 : fffff880`0976db80 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`0976db30 fffff800`02ebe153 : fffffa80`063b2b60 00000000`030dde88 fffff880`0976dbc8 00000000`00000000 : nt!NtCreateSection+0x162 fffff880`0976dbb0 00000000`77c5035a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`030dde68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c5035a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`03183079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 Followup: MachineOwner ---------
A oto pierwszy BSOD, który to zapoczątkował:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072112-40326-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symsols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03041e50 Debug session time: Sat Jul 21 15:09:13.601 2012 (GMT+2) System Uptime: 0 days 0:46:41.053 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8a013566000, 0, fffff8000313a079, 0} Could not read faulting driver name Probably caused by : memory_corruption ( nt!MiCompressRelocations+70 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a013566000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff8000313a079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ac0e0 fffff8a013566000 FAULTING_IP: nt!MiCompressRelocations+70 fffff800`0313a079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: rundll32.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800a5fb5d0 -- (.trap 0xfffff8800a5fb5d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000313a079 rsp=fffff8800a5fb760 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a013566000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`0313a079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`13566000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ef51e4 to fffff80002e75f00 STACK_TEXT: fffff880`0a5fb468 fffff800`02ef51e4 : 00000000`00000050 fffff8a0`13566000 00000000`00000000 fffff880`0a5fb5d0 : nt!KeBugCheckEx fffff880`0a5fb470 fffff800`02e73fee : 00000000`00000000 00000000`00000003 fffff800`0302ba00 fffff800`02e9ce00 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`0a5fb5d0 fffff800`0313a079 : 00000000`01000000 fffff800`0313a461 fffffa80`05ee7250 fffff800`0313a5a4 : nt!KiPageFault+0x16e fffff880`0a5fb760 fffff800`03138932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`0a5fb7b0 fffff800`0316e5d1 : fffff8a0`13328000 fffff880`0a5fb9c0 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`0a5fb920 fffff800`03163893 : fffff880`0a5fbb80 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`0a5fbb30 fffff800`02e75153 : fffffa80`046d5b60 00000000`001faed8 fffff880`0a5fbbc8 00000000`00000000 : nt!NtCreateSection+0x162 fffff880`0a5fbbb0 00000000`76e2035a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`001faeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e2035a STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`0313a079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 Followup: MachineOwner ---------
Wiecie w czym tkwi problem?
Pozdr.
Nie wiem co jest. Po jakichś 10 blue screenach postanowiłem doszczętnie usunąć Dr.Web'a w trybie awaryjnym(jednego z podprogramów nie dało się w ogóle usunąć, ciągle dodawał się sam do autostartu itd.). Uruchomiłem kompa, chwilę posiedziałem i nic. To włączyłem grę, pograłem jakieś półtorej godziny i żadnego blue screena. Nie wiem, czy akurat i się udało, czy problemem był Dr.Web. Umie ktoś z ww. zrzutów odczytać, co było problemem?
Z góry dzięki za pomoc.
Użytkownik Tomasz6688 edytował ten post 21 07 2012 - 18:30
temat edytowałem