Witam
Jestem nowym użytkownikiem siódemki i tego forumSmile . Wszystko do dzis było ok , aż tu nagle blue screen. Myślałem że te czasy już minęły. Bardzo bym prosił o poradę. Wyczytałem i google jak odczytać pliki .dmp. Niestety nie wiem co one oznaczają. Proszę więc o poradę. Mój sprzęt to:
Intel i7 860
Radeon 5850
Płyta gł. Gigabyte P55-UD3
zasilacz 650W
4gb ramu
Używam tego kompa od kilku miesięcy i dopiero teraz mam jakiś problem.
Oto log z WINDBG
Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\080210-17253-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02e63000 PsLoadedModuleList = 0xfffff800`030a0e50
Debug session time: Mon Aug 2 22:36:08.802 2010 (UTC + 2:00)
System Uptime: 0 days 0:58:31.910
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800031ea441, 0, bad0b158}
Probably caused by : ntkrnlmp.exe ( nt!ObpCloseHandleTableEntry+51 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800031ea441, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000000bad0b158, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`031ea441 4883bba800000000 cmp qword ptr [rbx+0A8h],0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000bad0b158
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310b0e0
00000000bad0b158
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff880077e32e8 -- (.exr 0xfffff880077e32e8)
ExceptionAddress: fffff800031ea441 (nt!ObpCloseHandleTableEntry+0x0000000000000051)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000bad0b158
Attempt to read from address 00000000bad0b158
TRAP_FRAME: fffff880077e3390 -- (.trap 0xfffff880077e3390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffff8a0000019b0
rdx=fffff8a0044632b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031ea441 rsp=fffff880077e3520 rbp=fffffa8005b7e060
r8=fffffa80036cd040 r9=0000000000000cac r10=0000000000000cac
r11=00000000003163c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObpCloseHandleTableEntry+0x51:
fffff800`031ea441 4883bba800000000 cmp qword ptr [rbx+0A8h],0 ds:c1e0:00000000`000000a8=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f0d929 to fffff80002ed3600
STACK_TEXT:
fffff880`077e2b18 fffff800`02f0d929 : 00000000`0000001e ffffffff`c0000005 fffff800`031ea441 00000000`00000000 : nt!KeBugCheckEx
fffff880`077e2b20 fffff800`02ed2c42 : fffff880`077e32e8 00000000`bad0b0b0 fffff880`077e3390 fffffa80`061c5b60 : nt!KiDispatchException+0x1b9
fffff880`077e31b0 fffff800`02ed17ba : 00000000`00000000 00000000`bad0b0b0 00000000`00000000 fffffa80`03896720 : nt!KiExceptionDispatch+0xc2
fffff880`077e3390 fffff800`031ea441 : fffffa80`03896720 fffff800`0319b643 fffff880`077e3580 fffffa80`03896720 : nt!KiPageFault+0x23a
fffff880`077e3520 fffff800`031ea3b4 : 00000000`00000cac fffffa80`05b7e060 fffff8a0`000019b0 00000000`00000cac : nt!ObpCloseHandleTableEntry+0x51
fffff880`077e35b0 fffff800`02ed2853 : fffffa80`061c5b60 fffff880`077e3680 fffffa80`04410000 00000000`00000000 : nt!ObpCloseHandle+0x94
fffff880`077e3600 fffff800`02ecedf0 : fffffa80`049e88b2 00000000`00000104 00000000`00001000 fffffa80`68746170 : nt!KiSystemServiceCopyEnd+0x13
fffff880`077e3798 fffffa80`049e88b2 : 00000000`00000104 00000000`00001000 fffffa80`68746170 fffffa80`00000000 : nt!KiServiceLinkage
fffff880`077e37a0 00000000`00000104 : 00000000`00001000 fffffa80`68746170 fffffa80`00000000 fffff880`077e3800 : 0xfffffa80`049e88b2
fffff880`077e37a8 00000000`00001000 : fffffa80`68746170 fffffa80`00000000 fffff880`077e3800 fffffa80`049e8600 : 0x104
fffff880`077e37b0 fffffa80`68746170 : fffffa80`00000000 fffff880`077e3800 fffffa80`049e8600 fffff880`077e3818 : 0x1000
fffff880`077e37b8 fffffa80`00000000 : fffff880`077e3800 fffffa80`049e8600 fffff880`077e3818 fffff880`077e3848 : 0xfffffa80`68746170
fffff880`077e37c0 fffff880`077e3800 : fffffa80`049e8600 fffff880`077e3818 fffff880`077e3848 fffffa80`03896720 : 0xfffffa80`00000000
fffff880`077e37c8 fffffa80`049e8600 : fffff880`077e3818 fffff880`077e3848 fffffa80`03896720 00000000`00000001 : 0xfffff880`077e3800
fffff880`077e37d0 fffff880`077e3818 : fffff880`077e3848 fffffa80`03896720 00000000`00000001 00000000`00000000 : 0xfffffa80`049e8600
fffff880`077e37d8 fffff880`077e3848 : fffffa80`03896720 00000000`00000001 00000000`00000000 fffffa80`049e89ca : 0xfffff880`077e3818
fffff880`077e37e0 fffffa80`03896720 : 00000000`00000001 00000000`00000000 fffffa80`049e89ca 00000000`00001000 : 0xfffff880`077e3848
fffff880`077e37e8 00000000`00000001 : 00000000`00000000 fffffa80`049e89ca 00000000`00001000 00000000`00000104 : 0xfffffa80`03896720
fffff880`077e37f0 00000000`00000000 : fffffa80`049e89ca 00000000`00001000 00000000`00000104 00000000`042eecb4 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ObpCloseHandleTableEntry+51
fffff800`031ea441 4883bba800000000 cmp qword ptr [rbx+0A8h],0
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ObpCloseHandleTableEntry+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1E_c0000005_BADMEMREF_nt!ObpCloseHandleTableEntry+51
BUCKET_ID: X64_0x1E_c0000005_BADMEMREF_nt!ObpCloseHandleTableEntry+51
Followup: MachineOwner
---------