blue screen win vista x64
Napsal: stř 30. čer 2010, 15:34
Zdravim -potrebuju poradit
zacal mi padat pc-stava se to bez zjevnych duvodu-a pri ruznych situacich-zde je vypis dump-ve kterem se ale nevyznam
Preinstaloval jsem ovl.grafiky-nepomohlo
diky za kazdou radu
ps-odkazy na jakekoliv anglicke ci jinak psane texty jsou pro me nepouzitelne
zacal mi padat pc-stava se to bez zjevnych duvodu-a pri ruznych situacich-zde je vypis dump-ve kterem se ale nevyznam
Preinstaloval jsem ovl.grafiky-nepomohlo
Kód: Vybrat vše
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini063010-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18209.amd64fre.vistasp2_gdr.100218-0019
Machine Name:
Kernel base = 0xfffff800`0345a000 PsLoadedModuleList = 0xfffff800`0361edd0
Debug session time: Wed Jun 30 15:14:22.772 2010 (GMT+2)
System Uptime: 0 days 0:04:23.309
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800034dc150, 0, d0}
Probably caused by : ntkrnlmp.exe ( nt!RtlVirtualUnwind+250 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800034dc150, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000000000000d0, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukce na adrese 0x%08lx odkazovala na adresu pam
FAULTING_IP:
nt!RtlVirtualUnwind+250
fffff800`034dc150 488b02 mov rax,qword ptr [rdx]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000000d0
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003681080
00000000000000d0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: CCC.exe
CURRENT_IRQL: 1
TRAP_FRAME: fffffa600ec62480 -- (.trap 0xfffffa600ec62480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=0000000000000000 rcx=0000000000000004
rdx=00000000000000d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034dc150 rsp=fffffa600ec62610 rbp=fffffa600ec626d0
r8=0000000000000006 r9=fffff8000345a000 r10=ffffffffffffff80
r11=fffff80003658000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlVirtualUnwind+0x250:
fffff800`034dc150 488b02 mov rax,qword ptr [rdx] ds:2d2e:00000000`000000d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003496b07 to fffff800034b44d0
STACK_TEXT:
fffffa60`0ec61c98 fffff800`03496b07 : 00000000`0000001e ffffffff`c0000005 fffff800`034dc150 00000000`00000000 : nt!KeBugCheckEx
fffffa60`0ec61ca0 fffff800`034b4329 : fffffa60`0ec623d8 00000000`00000001 fffffa60`0ec62480 00000000`00000233 : nt! ?? ::FNODOBFM::`string'+0x29117
fffffa60`0ec622a0 fffff800`034b3125 : 00000000`00000000 50023333`50023333 50023232`50023300 00000000`00000001 : nt!KiExceptionDispatch+0xa9
fffffa60`0ec62480 fffff800`034dc150 : 50022e2f`50022d2e 50022e2f`50022e2f 00000000`00000dc4 00000000`00001374 : nt!KiPageFault+0x1e5
fffffa60`0ec62610 fffff800`0373dc22 : fffff800`00000001 fffffa60`0d99b500 00000000`00000000 ffffffff`ffffff80 : nt!RtlVirtualUnwind+0x250
fffffa60`0ec62680 fffff800`034e194d : ffffffff`ffffff80 fffffa80`0904d700 fffffa60`0d99b570 fffff800`0345a000 : nt!PspGetSetContextInternal+0x36a
fffffa60`0ec62bd0 fffff800`034d5bbe : 00000000`00000000 00000000`00000000 fffff880`0dcd5320 fffff880`0dcd5348 : nt!PspGetSetContextSpecialApc+0x9d
fffffa60`0ec62ce0 fffff800`034d9613 : fffffa60`0ec62e00 00000000`00000000 00000000`00000000 fffffa80`0904d700 : nt!KiDeliverApc+0x19e
fffffa60`0ec62d80 fffffa80`0a7f91a1 : fffffa80`08b936b0 fffff800`03422750 00000000`e061e443 00000000`00000000 : nt!KiApcInterrupt+0x103
fffffa60`0ec62f10 fffffa80`08b936b0 : fffff800`03422750 00000000`e061e443 00000000`00000000 fffffa60`0ec633a0 : 0xfffffa80`0a7f91a1
fffffa60`0ec62f18 fffff800`03422750 : 00000000`e061e443 00000000`00000000 fffffa60`0ec633a0 fffff800`03718a15 : 0xfffffa80`08b936b0
fffffa60`0ec62f20 fffff800`034a3f49 : fffffa80`077465a0 00000000`00000000 00000000`00000000 00000000`00000000 : hal!KeQueryPerformanceCounter+0x30
fffffa60`0ec62f50 fffffa80`0a7371b0 : 00000000`80002711 fffffa60`0ec63168 fffffa60`0ec63088 fffffa80`0a83bbcd : nt!EtwpReserveTraceBuffer+0xd9
fffffa60`0ec62fc0 00000000`80002711 : fffffa60`0ec63168 fffffa60`0ec63088 fffffa80`0a83bbcd fffffa60`0ec63ca0 : 0xfffffa80`0a7371b0
fffffa60`0ec62fc8 fffffa60`0ec63168 : fffffa60`0ec63088 fffffa80`0a83bbcd fffffa60`0ec63ca0 00000000`00000000 : 0x80002711
fffffa60`0ec62fd0 fffffa60`0ec63088 : fffffa80`0a83bbcd fffffa60`0ec63ca0 00000000`00000000 fffff880`0e7dd701 : 0xfffffa60`0ec63168
fffffa60`0ec62fd8 fffffa80`0a83bbcd : fffffa60`0ec63ca0 00000000`00000000 fffff880`0e7dd701 fffffa80`06cac000 : 0xfffffa60`0ec63088
fffffa60`0ec62fe0 fffffa60`0ec63ca0 : 00000000`00000000 fffff880`0e7dd701 fffffa80`06cac000 00000000`00000000 : 0xfffffa80`0a83bbcd
fffffa60`0ec62fe8 00000000`00000000 : fffff880`0e7dd701 fffffa80`06cac000 00000000`00000000 fffffa60`0ec630b8 : 0xfffffa60`0ec63ca0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlVirtualUnwind+250
fffff800`034dc150 488b02 mov rax,qword ptr [rdx]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlVirtualUnwind+250
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b7d238f
FAILURE_BUCKET_ID: X64_0x1E_nt!RtlVirtualUnwind+250
BUCKET_ID: X64_0x1E_nt!RtlVirtualUnwind+250
Followup: MachineOwner
---------
0: kd> .trap 0xfffffa600ec62480
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=0000000000000000 rcx=0000000000000004
rdx=00000000000000d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034dc150 rsp=fffffa600ec62610 rbp=fffffa600ec626d0
r8=0000000000000006 r9=fffff8000345a000 r10=ffffffffffffff80
r11=fffff80003658000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlVirtualUnwind+0x250:
fffff800`034dc150 488b02 mov rax,qword ptr [rdx] ds:2d2e:00000000`000000d0=????????????????
ps-odkazy na jakekoliv anglicke ci jinak psane texty jsou pro me nepouzitelne