Gå til innhold

odderling

Medlemmer
  • Innlegg

    193
  • Ble med

  • Besøkte siden sist

Innlegg skrevet av odderling

  1. ja det kan jeg se men den blir ikke lagret i C:\windows\Minidump.

    Den blir lagret i mine dokumenter i BF2 (Det jeg spillte da det hendte) mappen og så i mappen som heter dmp og der er det ikke mindre enn 49 dump filer og om jeg prøver å åpne en av de med Windbg så kommer det opp:

    Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Documents and Settings\Odd Erling\Mine dokumenter\Battlefield 2\dmp\bf2_v1.1.2965-797.0_2008-03-16_10.17.21.dmp]
    User Mini Dump File: Only registers, stack and portions of memory are available
    
    Comment: 'Battlefield2 MiniDump. Address: 0D04C6F6 (In Windbg type: .ecxr)
    ASSERT INFORMATION:
    [...]
    [EOF]'
    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols
    Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols
    Windows XP Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
    Product: WinNt, suite: SingleUserTS
    Debug session time: Sun Mar 16 10:17:21.000 2008 (GMT+1)
    System Uptime: not available
    Process Uptime: 0 days 0:22:12.000
    ...................................................................................
    This dump file has an exception of interest stored in it.
    The stored exception information can be accessed via .ecxr.
    (524.fb4): Access violation - code c0000005 (first/second chance not available)
    eax=00000001 ebx=00000000 ecx=00000000 edx=08ab0024 esi=000003b4 edi=00000000
    eip=7c90eb94 esp=0012f7d4 ebp=0012f838 iopl=0		 nv up ei pl zr na pe nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000			 efl=00200246
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3			  ret
    0:000> !analyze -v
    *******************************************************************************
    *																			 *
    *						Exception Analysis								   *
    *																			 *
    *******************************************************************************
    
    *** WARNING: Unable to verify checksum for BF2.exe
    *** ERROR: Module load completed but symbols could not be loaded for BF2.exe
    *************************************************************************
    ***																   ***
    ***																   ***
    ***	Your debugger is not using the correct symbols				 ***
    ***																   ***
    ***	In order for this command to work properly, your symbol path   ***
    ***	must point to .pdb files that have full type information.	  ***
    ***																   ***
    ***	Certain .pdb files (such as the public OS symbols) do not	  ***
    ***	contain the required information.  Contact the group that	  ***
    ***	provided you with these symbols if you need this command to	***
    ***	work.														  ***
    ***																   ***
    ***	Type referenced: kernel32!pNlsUserInfo						 ***
    ***																   ***
    *************************************************************************
    *************************************************************************
    ***																   ***
    ***																   ***
    ***	Your debugger is not using the correct symbols				 ***
    ***																   ***
    ***	In order for this command to work properly, your symbol path   ***
    ***	must point to .pdb files that have full type information.	  ***
    ***																   ***
    ***	Certain .pdb files (such as the public OS symbols) do not	  ***
    ***	contain the required information.  Contact the group that	  ***
    ***	provided you with these symbols if you need this command to	***
    ***	work.														  ***
    ***																   ***
    ***	Type referenced: kernel32!pNlsUserInfo						 ***
    ***																   ***
    *************************************************************************
    
    FAULTING_IP: 
    AIDLL!deinitDll+982e6
    0d04c6f6 8b4e28		  mov	 ecx,dword ptr [esi+28h]
    
    EXCEPTION_RECORD:  ffffffff -- (.exr 0xffffffffffffffff)
    ExceptionAddress: 0d04c6f6 (AIDLL!deinitDll+0x000982e6)
      ExceptionCode: c0000005 (Access violation)
     ExceptionFlags: 00000000
    NumberParameters: 2
      Parameter[0]: 00000000
      Parameter[1]: 00000028
    Attempt to read from address 00000028
    
    DEFAULT_BUCKET_ID:  NULL_POINTER_READ
    
    PROCESS_NAME:  BF2.exe
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s".
    
    READ_ADDRESS:  00000028 
    
    NTGLOBALFLAG:  0
    
    LAST_CONTROL_TRANSFER:  from 0d068593 to 0d04c6f6
    
    STACK_TEXT:  
    WARNING: Stack unwind information not available. Following frames may be wrong.
    0012fc7c 0d068593 00000001 00000002 c133777b AIDLL!deinitDll+0x982e6
    0012fca4 0d069ab0 00000002 10b9f64c 00000000 AIDLL!deinitDll+0xb4183
    0012fce8 0d0813a4 40000000 405c8444 10b9f31c AIDLL!deinitDll+0xb56a0
    0012fd08 0d0302d6 40000000 405c8444 08f180cc AIDLL!deinitDll+0xccf94
    0012fd1c 0cfed586 40000000 405c8444 0327209c AIDLL!deinitDll+0x7bec6
    0012fd50 0cf9108b 004b7b1f 20000000 3fa11111 AIDLL!deinitDll+0x39176
    0012fdb4 7c3a4ec3 00000000 0000000b 014623a0 AIDLL+0x108b
    0012fdc8 7c3b2c75 01511020 00478e54 0012fe1c msvcp71!std::basic_string<char,std::char_traits<char>,std::allocator<char> >::compare+0x21
    0012fdf0 7c3a1ce3 00000000 ffffffff 7c3a1e96 msvcp71!std::operator<<char,std::char_traits<char>,std::allocator<char> >+0xd
    0012fedc 7c910970 014529a8 00400000 00000000 msvcp71!std::basic_string<char,std::char_traits<char>,std::allocator<char> >::_Tidy+0x45
    0012ffc0 7c816fd7 00310036 00340039 7ffdf000 ntdll!RtlReleasePebLock+0xf
    0012fd8c 0040d003 00000000 3d088889 00142367 kernel32!BaseProcessStart+0x23
    0012fedc 7c910970 014529a8 00400000 00000000 BF2+0xd003
    0012ffc0 7c816fd7 00310036 00340039 7ffdf000 ntdll!RtlReleasePebLock+0xf
    0012fec0 00402b9d 00400000 00000000 00142367 kernel32!BaseProcessStart+0x23
    0012ffc0 7c816fd7 00310036 00340039 7ffdf000 BF2+0x2b9d
    0012ff18 00829c2d 00400000 00000000 00142367 kernel32!BaseProcessStart+0x23
    0012ffc0 7c816fd7 00310036 00340039 7ffdf000 BF2+0x429c2d
    0012fff0 00000000 00ac406e 00000000 00000000 kernel32!BaseProcessStart+0x23
    
    
    STACK_COMMAND:  ~0s; .ecxr; kb
    
    FAULTING_THREAD:  00000fb4
    
    PRIMARY_PROBLEM_CLASS:  NULL_POINTER_READ
    
    BUGCHECK_STR:  APPLICATION_FAULT_NULL_POINTER_READ
    
    FOLLOWUP_IP: 
    AIDLL!deinitDll+982e6
    0d04c6f6 8b4e28		  mov	 ecx,dword ptr [esi+28h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  AIDLL!deinitDll+982e6
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: AIDLL
    
    IMAGE_NAME:  AIDLL.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4519928b
    
    FAILURE_BUCKET_ID:  AIDLL.dll!deinitDll_c0000005_NULL_POINTER_READ
    
    BUCKET_ID:  APPLICATION_FAULT_NULL_POINTER_READ_AIDLL!deinitDll+982e6
    
    Followup: MachineOwner
    ---------

     

    Så finner du noe spennende her Fenderebest?

  2. De sier at 1 bilde sier 1000 ord så... Crash.jpg

     

    Dette skjer bare når jeg holder på med 3d applikasjoner.

    Driverne er oppdatert og er innstalert skikkelig, kan det hende at det har noe å si at jeg har dual screen?

    Om det kan vere relatert vet jeg ikke men om jeg prøver å starte PC-en med to RAM brikker så vil den ikke laste POST og det skjer ikke noe og jeg får ikke bilde.

  3. hm, jeg oppdaterte BIOS til 0704 og nå kan jeg ikke starte PC-en med to moduler eller for å være mer spesifiks så kan jeg bare starte PC-en når brikke 1 står i.

    Om jeg prøver med begge så kan jeg ikke starte, prøver jeg med brikke 2 så starter den heller ikke!

     

    Det virker som brikke 2 er ustabil og "baja" siden den virker bare av og til.

    Noen som har en formening om jeg bør kjøpe nye?

     

    Sorry chrlod for å rappe litt av tråden din...

  4. Jeg ser det ikke er bare meg som har det problemet.

    Har samme RAM og MB bare ikke premium, men jeg er ikke sikker på om det har noe med det å gjøre.

    Om jeg kjører memtest så finner den ikke noe problem, men om jeg begynner å spille så tar det gjerne 2 timer eller så og så klikker det helt.

    Om jeg har musikk spillende så fortsetter den men bildet har fryst seg.

    Det fører til at jeg må restarte, men tingen med meg er at i det PC-en skal restarte seg så stopper den/ det blir ikke bilde, og jeg må ta ut en spesiel brikke og så starte på nytt og da kommer det opp at OC ble ikke loadet skikkelig og jeg skrur av PC-en og setter i igjenn den RAM brikken jeg tok ut og så bruker det å virke!

  5. Jeg overklokket skjermkortet med rivatuner og der var det en funksjon som gjør at jeg kan defaulte OC'ingen. jeg trykkte på knappen og så måtte jeg restarte PC-en og det skjedde automatisk og så når den skulle starte iigjenn så sanurret vifta på skjermkortet for fullt og det ble ikke bilde på skjermene.

    Har prøvd å tatt ut batteriet på hovedkortet samt å ta ut strøm ledningen og latt strømen gå ut av strømforskyningen. Så andre tips godtar jeg med åpne armer!!

  6. Etter en del driver problemer så tenkte jeg at jeg skulle defaulte overklokkingen jeg hadde satt. i det jeg trykker på å defaulte OC'ingen så står det at jeg me restarte PC-en så jeg trykker bare ok og PC-en skrur seg av.

    Men i det PC-en prøver å starte opp igjenn så snurrer skjermkort vifta for 100 % og jeg får ikke noe bilde på skjermene mine overhode.

    Så hjelp, nå er det straks sønndag og de er alltid kjedelig uten pc!!

  7. CA midt i 3DMark så stopper "filmen" og så etter en liten stund så kommer det opp at driverne ikke virker som de skal og at jeg må restarte for at jeg skal få alle funksjonene.

    Det er forferdelig irriterende og jeg har reinstallert driveren for skjermkortet så sent som i dag!

  8. Jeg har rotet littt rundt i debuging programet og jeg ser at det står tre forskjellige "probably caused" programer.

     

    Dump 1

     

    Klikk for å se/fjerne innholdet nedenfor
    <Microsoft ® Windows Debugger Version 6.8.0004.0 X86

    Copyright © Microsoft Corporation. All rights reserved.

     

     

    Loading Dump File [C:\WINDOWS\Minidump\Mini030508-02.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

     

    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible

    Product: WinNt, suite: TerminalServer SingleUserTS

    Built by: 2600.xpsp_sp2_gdr.070227-2254

    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700

    Debug session time: Wed Mar 5 18:55:05.531 2008 (GMT+1)

    System Uptime: 0 days 0:05:15.172

    Loading Kernel Symbols

    ..........................................................................................

    ...................................................

    Loading User Symbols

    Loading unloaded module list

    .........

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    Use !analyze -v to get detailed debugging information.

     

    BugCheck 1000008E, {c0000005, 80545d11, b4a5b858, 0}

     

     

     

    Probably caused by : win32k.sys ( win32k!RBRUSH::vRemoveRef+e )

     

    Followup: MachineOwner

    ---------

     

    3: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)

    This is a very common bugcheck. Usually the exception address pinpoints

    the driver/function that caused the problem. Always note this address

    as well as the link date of the driver/image that contains this address.

    Some common problems are exception code 0x80000003. This means a hard

    coded breakpoint or assertion was hit, but this system was booted

    /NODEBUG. This is not supposed to happen as developers should never have

    hardcoded breakpoints in retail code, but ...

    If this happens, make sure a debugger gets connected, and the

    system is booted /DEBUG. This will let us see why this breakpoint is

    happening.

    Arguments:

    Arg1: c0000005, The exception code that was not handled

    Arg2: 80545d11, The address that the exception occurred at

    Arg3: b4a5b858, Trap Frame

    Arg4: 00000000

     

    Debugging Details:

    ------------------

     

     

     

     

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s".

     

    FAULTING_IP:

    nt!__InterlockedDecrement+5

    80545d11 f00fc101 lock xadd dword ptr [ecx],eax

     

    TRAP_FRAME: b4a5b858 -- (.trap 0xffffffffb4a5b858)

    ErrCode = 00000002

    eax=ffffffff ebx=00000001 ecx=00002000 edx=dd280005 esi=00002000 edi=88011431

    eip=80545d11 esp=b4a5b8cc ebp=b4a5b8d4 iopl=0 nv up ei pl nz na pe nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206

    nt!__InterlockedDecrement+0x5:

    80545d11 f00fc101 lock xadd dword ptr [ecx],eax ds:0023:00002000=????????

    Resetting default scope

     

    CUSTOMER_CRASH_COUNT: 2

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    BUGCHECK_STR: 0x8E

     

    PROCESS_NAME: firefox.exe

     

    LAST_CONTROL_TRANSFER: from bf8079c2 to 80545d11

     

    STACK_TEXT:

    b4a5b8c8 bf8079c2 e6dc2538 b4a5b8f4 bf8093d2 nt!__InterlockedDecrement+0x5

    b4a5b8d4 bf8093d2 00000001 b4a5b908 bf809427 win32k!RBRUSH::vRemoveRef+0xe

    b4a5b8e0 bf809427 88011431 0000ffff 00000000 win32k!EBRUSHOBJ::vNuke+0x13

    b4a5b8f4 bf80d2b3 00000000 00000000 bf80fafb win32k!XDCOBJ::bDeleteDC+0x4e

    b4a5b90c bf80fb4c e25e0008 00000000 00000000 win32k!bDeleteDCInternal+0x134

    b4a5b928 8054086c 88011431 0012f618 7c90eb94 win32k!NtGdiDeleteObjectApp+0x88

    b4a5b928 7c90eb94 88011431 0012f618 7c90eb94 nt!KiFastCallEntry+0xfc

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    0012f618 00000000 00000000 00000000 00000000 0x7c90eb94

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    win32k!RBRUSH::vRemoveRef+e

    bf8079c2 85c0 test eax,eax

     

    SYMBOL_STACK_INDEX: 1

     

    SYMBOL_NAME: win32k!RBRUSH::vRemoveRef+e

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: win32k

     

    IMAGE_NAME: win32k.sys

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45f013f6

     

    FAILURE_BUCKET_ID: 0x8E_win32k!RBRUSH::vRemoveRef+e

     

    BUCKET_ID: 0x8E_win32k!RBRUSH::vRemoveRef+e

     

    Followup: MachineOwner

    --------->

     

    Dump 2

     

    Klikk for å se/fjerne innholdet nedenfor
    <

    Microsoft ® Windows Debugger Version 6.8.0004.0 X86

    Copyright © Microsoft Corporation. All rights reserved.

     

     

    Loading Dump File [C:\WINDOWS\Minidump\Mini030508-03.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

     

    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible

    Product: WinNt, suite: TerminalServer SingleUserTS

    Built by: 2600.xpsp_sp2_gdr.070227-2254

    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700

    Debug session time: Wed Mar 5 18:57:50.140 2008 (GMT+1)

    System Uptime: 0 days 0:01:53.796

    Loading Kernel Symbols

    ..........................................................................................

    .................................................

    Loading User Symbols

    Loading unloaded module list

    ...........

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    Use !analyze -v to get detailed debugging information.

     

    BugCheck 1000008E, {c0000005, bf802997, b521bba4, 0}

     

     

     

    Probably caused by : win32k.sys ( win32k!PopAndFreeW32ThreadLock+15 )

     

    Followup: MachineOwner

    ---------

     

    0: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)

    This is a very common bugcheck. Usually the exception address pinpoints

    the driver/function that caused the problem. Always note this address

    as well as the link date of the driver/image that contains this address.

    Some common problems are exception code 0x80000003. This means a hard

    coded breakpoint or assertion was hit, but this system was booted

    /NODEBUG. This is not supposed to happen as developers should never have

    hardcoded breakpoints in retail code, but ...

    If this happens, make sure a debugger gets connected, and the

    system is booted /DEBUG. This will let us see why this breakpoint is

    happening.

    Arguments:

    Arg1: c0000005, The exception code that was not handled

    Arg2: bf802997, The address that the exception occurred at

    Arg3: b521bba4, Trap Frame

    Arg4: 00000000

     

    Debugging Details:

    ------------------

     

     

     

     

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s".

     

    FAULTING_IP:

    win32k!PopAndFreeW32ThreadLock+15

    bf802997 8b11 mov edx,dword ptr [ecx]

     

    TRAP_FRAME: b521bba4 -- (.trap 0xffffffffb521bba4)

    ErrCode = 00000000

    eax=e1047c28 ebx=00000000 ecx=00002000 edx=80000000 esi=e1047c28 edi=00000000

    eip=bf802997 esp=b521bc18 ebp=b521bc18 iopl=0 nv up ei pl nz na pe nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206

    win32k!PopAndFreeW32ThreadLock+0x15:

    bf802997 8b11 mov edx,dword ptr [ecx] ds:0023:00002000=????????

    Resetting default scope

     

    CUSTOMER_CRASH_COUNT: 3

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    BUGCHECK_STR: 0x8E

     

    PROCESS_NAME: explorer.exe

     

    LAST_CONTROL_TRANSFER: from bf820429 to bf802997

     

    STACK_TEXT:

    b521bc18 bf820429 00002000 e1047c28 b521bc60 win32k!PopAndFreeW32ThreadLock+0x15

    b521bc28 bf820207 e1047c28 893e6dc0 e1047c28 win32k!CleanupW32ThreadLocks+0x11

    b521bc3c bf8209b0 8914fda8 00000000 00000000 win32k!DestroyThreadsObjects+0x25

    b521bc60 bf819e30 00000001 b521bc88 bf819ef4 win32k!xxxDestroyThreadInfo+0x1cf

    b521bc6c bf819ef4 8914fda8 00000001 00000000 win32k!UserThreadCallout+0x4b

    b521bc88 805d0d38 8914fda8 00000001 8914fda8 win32k!W32pThreadCallout+0x3d

    b521bd14 805d1150 00000000 00000000 8914fda8 nt!PspExitThread+0x3cc

    b521bd34 805d1490 8914fda8 00000000 b521bd64 nt!PspTerminateThreadByPointer+0x52

    b521bd54 8054086c 00000000 00000000 0164ffb4 nt!NtTerminateThread+0x70

    b521bd54 7c90eb94 00000000 00000000 0164ffb4 nt!KiFastCallEntry+0xfc

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    0164ffb4 00000000 00000000 00000000 00000000 0x7c90eb94

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    win32k!PopAndFreeW32ThreadLock+15

    bf802997 8b11 mov edx,dword ptr [ecx]

     

    SYMBOL_STACK_INDEX: 0

     

    SYMBOL_NAME: win32k!PopAndFreeW32ThreadLock+15

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: win32k

     

    IMAGE_NAME: win32k.sys

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45f013f6

     

    FAILURE_BUCKET_ID: 0x8E_win32k!PopAndFreeW32ThreadLock+15

     

    BUCKET_ID: 0x8E_win32k!PopAndFreeW32ThreadLock+15

     

    Followup: MachineOwner

    --------->

     

    Dump 3

     

    Klikk for å se/fjerne innholdet nedenfor
    Microsoft ® Windows Debugger Version 6.8.0004.0 X86

    Copyright © Microsoft Corporation. All rights reserved.

     

     

    Loading Dump File [C:\WINDOWS\Minidump\Mini030708-01.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

     

    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible

    Product: WinNt

    Built by: 2600.xpsp_sp2_gdr.070227-2254

    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700

    Debug session time: Fri Mar 7 22:14:10.875 2008 (GMT+1)

    System Uptime: 0 days 0:43:45.875

    Loading Kernel Symbols

    ..........................................................................................

    ....................................................

    Loading User Symbols

    Loading unloaded module list

    ............

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    Use !analyze -v to get detailed debugging information.

     

    BugCheck A, {2000, 2, 1, 806e4a2a}

     

    Unable to load image JGOGO.sys, Win32 error 0n2

    *** WARNING: Unable to verify timestamp for JGOGO.sys

    *** ERROR: Module load completed but symbols could not be loaded for JGOGO.sys

     

     

    Probably caused by : afd.sys ( afd!AfdFastIoDeviceControl+5bd )

     

    Followup: MachineOwner

    ---------

     

    0: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    IRQL_NOT_LESS_OR_EQUAL (a)

    An attempt was made to access a pageable (or completely invalid) address at an

    interrupt request level (IRQL) that is too high. This is usually

    caused by drivers using improper addresses.

    If a kernel debugger is available get the stack backtrace.

    Arguments:

    Arg1: 00002000, memory referenced

    Arg2: 00000002, IRQL

    Arg3: 00000001, bitfield :

    bit 0 : value 0 = read operation, 1 = write operation

    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

    Arg4: 806e4a2a, address which referenced memory

     

    Debugging Details:

    ------------------

     

     

     

     

    WRITE_ADDRESS: 00002000

     

    CURRENT_IRQL: 2

     

    FAULTING_IP:

    hal!KeAcquireInStackQueuedSpinLock+3a

    806e4a2a 8902 mov dword ptr [edx],eax

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    BUGCHECK_STR: 0xA

     

    TRAP_FRAME: b5853a40 -- (.trap 0xffffffffb5853a40)

    ErrCode = 00000002

    eax=b5853ac4 ebx=b5853b1c ecx=8912c6cd edx=00002000 esi=8912c6b0 edi=00000000

    eip=806e4a2a esp=b5853ab4 ebp=b5853b10 iopl=0 nv up ei ng nz na po nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282

    hal!KeAcquireInStackQueuedSpinLock+0x3a:

    806e4a2a 8902 mov dword ptr [edx],eax ds:0023:00002000=????????

    Resetting default scope

     

    LAST_CONTROL_TRANSFER: from 806e4a2a to 80543930

     

    STACK_TEXT:

    b5853a40 806e4a2a badb0d00 00002000 00000000 nt!KiTrap0E+0x238

    b5853b40 80534a4d 0019cc10 80560ec0 00000110 hal!KeAcquireInStackQueuedSpinLock+0x3a

    b5853b10 b73cebc4 00001000 00a5f0dc b73cebc4 nt!ExReleaseResourceLite+0x8d

    b5853c5c 8057f1fd 891cf418 00000001 00a5f010 afd!AfdFastIoDeviceControl+0x5bd

    b5853d00 805780c2 000000f4 000000ec 00000000 nt!IopXxxControlFile+0x255

    b5853d34 8054086c 000000f4 000000ec 00000000 nt!NtDeviceIoControlFile+0x2a

    b5853d34 7c90eb94 000000f4 000000ec 00000000 nt!KiFastCallEntry+0xfc

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    00a5f06c 00000000 00000000 00000000 00000000 0x7c90eb94

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    afd!AfdFastIoDeviceControl+5bd

    b73cebc4 e955fdffff jmp afd!AfdFastIoDeviceControl+0xaf (b73ce91e)

     

    SYMBOL_STACK_INDEX: 3

     

    SYMBOL_NAME: afd!AfdFastIoDeviceControl+5bd

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: afd

     

    IMAGE_NAME: afd.sys

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb5

     

    FAILURE_BUCKET_ID: 0xA_W_afd!AfdFastIoDeviceControl+5bd

     

    BUCKET_ID: 0xA_W_afd!AfdFastIoDeviceControl+5bd

     

    Followup: MachineOwner

    ---------

     

    0: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    IRQL_NOT_LESS_OR_EQUAL (a)

    An attempt was made to access a pageable (or completely invalid) address at an

    interrupt request level (IRQL) that is too high. This is usually

    caused by drivers using improper addresses.

    If a kernel debugger is available get the stack backtrace.

    Arguments:

    Arg1: 00002000, memory referenced

    Arg2: 00000002, IRQL

    Arg3: 00000001, bitfield :

    bit 0 : value 0 = read operation, 1 = write operation

    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

    Arg4: 806e4a2a, address which referenced memory

     

    Debugging Details:

    ------------------

     

     

     

     

    WRITE_ADDRESS: 00002000

     

    CURRENT_IRQL: 2

     

    FAULTING_IP:

    hal!KeAcquireInStackQueuedSpinLock+3a

    806e4a2a 8902 mov dword ptr [edx],eax

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    BUGCHECK_STR: 0xA

     

    TRAP_FRAME: b5853a40 -- (.trap 0xffffffffb5853a40)

    ErrCode = 00000002

    eax=b5853ac4 ebx=b5853b1c ecx=8912c6cd edx=00002000 esi=8912c6b0 edi=00000000

    eip=806e4a2a esp=b5853ab4 ebp=b5853b10 iopl=0 nv up ei ng nz na po nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282

    hal!KeAcquireInStackQueuedSpinLock+0x3a:

    806e4a2a 8902 mov dword ptr [edx],eax ds:0023:00002000=????????

    Resetting default scope

     

    LAST_CONTROL_TRANSFER: from 806e4a2a to 80543930

     

    STACK_TEXT:

    b5853a40 806e4a2a badb0d00 00002000 00000000 nt!KiTrap0E+0x238

    b5853b40 80534a4d 0019cc10 80560ec0 00000110 hal!KeAcquireInStackQueuedSpinLock+0x3a

    b5853b10 b73cebc4 00001000 00a5f0dc b73cebc4 nt!ExReleaseResourceLite+0x8d

    b5853c5c 8057f1fd 891cf418 00000001 00a5f010 afd!AfdFastIoDeviceControl+0x5bd

    b5853d00 805780c2 000000f4 000000ec 00000000 nt!IopXxxControlFile+0x255

    b5853d34 8054086c 000000f4 000000ec 00000000 nt!NtDeviceIoControlFile+0x2a

    b5853d34 7c90eb94 000000f4 000000ec 00000000 nt!KiFastCallEntry+0xfc

    WARNING: Frame IP not in any known module. Following frames may be wrong.

    00a5f06c 00000000 00000000 00000000 00000000 0x7c90eb94

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    afd!AfdFastIoDeviceControl+5bd

    b73cebc4 e955fdffff jmp afd!AfdFastIoDeviceControl+0xaf (b73ce91e)

     

    SYMBOL_STACK_INDEX: 3

     

    SYMBOL_NAME: afd!AfdFastIoDeviceControl+5bd

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: afd

     

    IMAGE_NAME: afd.sys

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb5

     

    FAILURE_BUCKET_ID: 0xA_W_afd!AfdFastIoDeviceControl+5bd

     

    BUCKET_ID: 0xA_W_afd!AfdFastIoDeviceControl+5bd

     

    Followup: MachineOwner

    --------->

     

    btw vet ikke om det er relatert men jeg lastet ned ny shockwave og det ser ikke ut som FireFox er blitt mer stabil.

     

    og her er en jeg fikk i dag :hrm:

     

    dump 4

     

    Klikk for å se/fjerne innholdet nedenfor
    Microsoft ® Windows Debugger Version 6.8.0004.0 X86

    Copyright © Microsoft Corporation. All rights reserved.

     

     

    Loading Dump File [C:\WINDOWS\Minidump\Mini030808-01.dmp]

    Mini Kernel Dump File: Only registers and stack trace are available

     

    Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Executable search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols

    Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible

    Product: WinNt

    Built by: 2600.xpsp_sp2_gdr.070227-2254

    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700

    Debug session time: Sat Mar 8 10:09:03.953 2008 (GMT+1)

    System Uptime: 0 days 11:52:46.960

    Loading Kernel Symbols

    ..........................................................................................

    .................................................

    Loading User Symbols

    Loading unloaded module list

    ............

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    Use !analyze -v to get detailed debugging information.

     

    BugCheck A, {2008, 2, 0, 804e8178}

     

    Unable to load image JGOGO.sys, Win32 error 0n2

    *** WARNING: Unable to verify timestamp for JGOGO.sys

    *** ERROR: Module load completed but symbols could not be loaded for JGOGO.sys

     

     

    Probably caused by : ntkrpamp.exe ( nt!CcUnmapVacbArray+b0 )

     

    Followup: MachineOwner

    ---------

     

    1: kd> !analyze -v

    *******************************************************************************

    * *

    * Bugcheck Analysis *

    * *

    *******************************************************************************

     

    IRQL_NOT_LESS_OR_EQUAL (a)

    An attempt was made to access a pageable (or completely invalid) address at an

    interrupt request level (IRQL) that is too high. This is usually

    caused by drivers using improper addresses.

    If a kernel debugger is available get the stack backtrace.

    Arguments:

    Arg1: 00002008, memory referenced

    Arg2: 00000002, IRQL

    Arg3: 00000000, bitfield :

    bit 0 : value 0 = read operation, 1 = write operation

    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

    Arg4: 804e8178, address which referenced memory

     

    Debugging Details:

    ------------------

     

     

     

     

    READ_ADDRESS: 00002008

     

    CURRENT_IRQL: 2

     

    FAULTING_IP:

    nt!CcUnmapVacbArray+b0

    804e8178 66837e0800 cmp word ptr [esi+8],0

     

    CUSTOMER_CRASH_COUNT: 1

     

    DEFAULT_BUCKET_ID: DRIVER_FAULT

     

    BUGCHECK_STR: 0xA

     

    TRAP_FRAME: bacfba3c -- (.trap 0xffffffffbacfba3c)

    ErrCode = 00000000

    eax=00000001 ebx=00040000 ecx=885e22c8 edx=00000000 esi=00002000 edi=885e2298

    eip=804e8178 esp=bacfbab0 ebp=bacfbacc iopl=0 nv up ei pl nz na pe nc

    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206

    nt!CcUnmapVacbArray+0xb0:

    804e8178 66837e0800 cmp word ptr [esi+8],0 ds:0023:00002008=????

    Resetting default scope

     

    LAST_CONTROL_TRANSFER: from 804e8178 to 80543930

     

    STACK_TEXT:

    bacfba3c 804e8178 badb0d00 00000000 893b5b40 nt!KiTrap0E+0x238

    bacfbacc 804e51ec 00000000 00000000 885e22fc nt!CcUnmapVacbArray+0xb0

    bacfbae8 804e54a7 885e2298 8930cd60 885e2298 nt!CcUnmapAndPurge+0x20

    bacfbb18 804e5c07 00000000 e6d1ec08 8930cd60 nt!CcDeleteSharedCacheMap+0xc5

    bacfbb34 ba548c35 00000000 00000000 00000000 nt!CcUninitializeCacheMap+0x12d

    bacfbb58 ba546c1b e6d1ec08 00000000 00000000 Ntfs!NtfsDeleteInternalAttributeStream+0x98

    bacfbb74 ba521800 88767208 e6d1ec08 00000000 Ntfs!NtfsRemoveScb+0x77

    bacfbb90 ba525550 88767208 e6d1eb40 00000000 Ntfs!NtfsPrepareFcbForRemoval+0x52

    bacfbbe0 ba546c7c 88767208 89cee100 e96d2cc8 Ntfs!NtfsTeardownFromLcb+0x2bc

    bacfbc38 ba5217b0 88767208 e96d2d90 00000000 Ntfs!NtfsTeardownStructures+0x125

    bacfbc64 ba5444b5 88767208 016d2d90 00000000 Ntfs!NtfsDecrementCloseCounts+0x9e

    bacfbce8 ba5493e3 88767208 e96d2d90 e96d2cc8 Ntfs!NtfsCommonClose+0x397

    bacfbd7c 805379bd 00000000 00000000 89e3eda8 Ntfs!NtfsFspClose+0xe3

    bacfbdac 805ce84c 00000000 00000000 00000000 nt!ExpWorkerThread+0xef

    bacfbddc 8054532e 805378ce 00000000 00000000 nt!PspSystemThreadStartup+0x34

    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

     

     

    STACK_COMMAND: kb

     

    FOLLOWUP_IP:

    nt!CcUnmapVacbArray+b0

    804e8178 66837e0800 cmp word ptr [esi+8],0

     

    SYMBOL_STACK_INDEX: 1

     

    SYMBOL_NAME: nt!CcUnmapVacbArray+b0

     

    FOLLOWUP_NAME: MachineOwner

     

    MODULE_NAME: nt

     

    IMAGE_NAME: ntkrpamp.exe

     

    DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d

     

    FAILURE_BUCKET_ID: 0xA_nt!CcUnmapVacbArray+b0

     

    BUCKET_ID: 0xA_nt!CcUnmapVacbArray+b0

     

    Followup: MachineOwner

    --------->

     

    Om det kan vere til mere hjelp så er det ikke alltid det blir blue screen av og til så henger alt seg opp og lyden looper på det siste sekundet og så går det et lite minutt så kommer det opp "En kontakt har blitt frakoblet" så må jeg sette inn alle lyd-kabler som står bak på hovedkortet og så forklare realtek hva som er hva av de "nye" kablene.

  9. jeg har og blitt plaget av crasher nå i det siste men jeg har ikke innstalert noen nye drivere men jeg har vert plaget av crasher siden min pc ble satt sammen.

    Så jeg tar bare å copy/paster det jeg fikk i command - dump jeg.

     

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instruksjonen i "0x%08lx" refererte til adresse "0x%08lx". Minnet kunne ikke v re "%s".
    
    FAULTING_IP: 
    win32k!PopAndFreeW32ThreadLock+15
    bf802997 8b11			mov	 edx,dword ptr [ecx]
    
    TRAP_FRAME:  b521bba4 -- (.trap 0xffffffffb521bba4)
    ErrCode = 00000000
    eax=e1047c28 ebx=00000000 ecx=00002000 edx=80000000 esi=e1047c28 edi=00000000
    eip=bf802997 esp=b521bc18 ebp=b521bc18 iopl=0		 nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000			 efl=00010206
    win32k!PopAndFreeW32ThreadLock+0x15:
    bf802997 8b11			mov	 edx,dword ptr [ecx]  ds:0023:00002000=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  3
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  explorer.exe
    
    LAST_CONTROL_TRANSFER:  from bf820429 to bf802997
    
    STACK_TEXT:  
    b521bc18 bf820429 00002000 e1047c28 b521bc60 win32k!PopAndFreeW32ThreadLock+0x15
    b521bc28 bf820207 e1047c28 893e6dc0 e1047c28 win32k!CleanupW32ThreadLocks+0x11
    b521bc3c bf8209b0 8914fda8 00000000 00000000 win32k!DestroyThreadsObjects+0x25
    b521bc60 bf819e30 00000001 b521bc88 bf819ef4 win32k!xxxDestroyThreadInfo+0x1cf
    b521bc6c bf819ef4 8914fda8 00000001 00000000 win32k!UserThreadCallout+0x4b
    b521bc88 805d0d38 8914fda8 00000001 8914fda8 win32k!W32pThreadCallout+0x3d
    b521bd14 805d1150 00000000 00000000 8914fda8 nt!PspExitThread+0x3cc
    b521bd34 805d1490 8914fda8 00000000 b521bd64 nt!PspTerminateThreadByPointer+0x52
    b521bd54 8054086c 00000000 00000000 0164ffb4 nt!NtTerminateThread+0x70
    b521bd54 7c90eb94 00000000 00000000 0164ffb4 nt!KiFastCallEntry+0xfc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0164ffb4 00000000 00000000 00000000 00000000 0x7c90eb94
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!PopAndFreeW32ThreadLock+15
    bf802997 8b11			mov	 edx,dword ptr [ecx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  win32k!PopAndFreeW32ThreadLock+15
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  45f013f6
    
    FAILURE_BUCKET_ID:  0x8E_win32k!PopAndFreeW32ThreadLock+15
    
    BUCKET_ID:  0x8E_win32k!PopAndFreeW32ThreadLock+15
    
    Followup: MachineOwner
    ---------

  10. har fått problemer med OC'ingen min her nå for når jeg setter Core bus til 680 og Memory bus til 1000 så får jeg bare system crash og blue screen, temperaturen ligger stødig på ca 65c under full load etter et par timer.

    Skjønner ikke hva det kan vere som forårsaker dette men det er fryktelig kjedelig når det skjer.

×
×
  • Opprett ny...