Работал с Word 2007 - при сохранении файла внезапно выскочил BSOD. До этого, BSOD на этой системе ни разу не было. Комп работает в режиме 24/7, конфигурация в профиле...
Недели 2 назад заменил 2 планки памяти, на больший объем. С тех пор никаких проблем не было... Из того, что я понял в дампе - проблему вызвал WINWORD.EXE, а что такое ntkrnlmp.exe? И что может это вызвать?
Заранее благодарен за помощь!
BSOD:
читать дальше »
Код:
Сигнатура проблемы:
Имя события проблемы: BlueScreen
Версия ОС: 6.1.7600.2.0.0.256.1
Код языка: 1049
Дополнительные сведения об этой проблеме:
BCCode: 1a
BCP1: 0000000000041790
BCP2: FFFFFA800425F880
BCP3: 000000000000FFFF
BCP4: 0000000000000000
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Файлы, содержащие сведения об этой проблеме:
C:\Windows\Minidump\013111-69092-01.dmp
C:\Users\~~~~\AppData\Local\Temp\WER-81806-0.sysdata.xml
Малый дамп:
читать дальше »
Код:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\013111-69092-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols;C:\symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03059e50
Debug session time: Mon Jan 31 11:42:49.068 2011 (GMT+2)
System Uptime: 1 days 9:57:08.292
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa800425f880, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa800425f880
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WINWORD.EXE
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002efff9e to fffff80002e8c740
STACK_TEXT:
fffff880`099098c8 fffff800`02efff9e : 00000000`0000001a 00000000`00041790 fffffa80`0425f880 00000000`0000ffff : nt!KeBugCheckEx
fffff880`099098d0 fffff800`02e5fc23 : ffffffff`00000000 00000000`0ecdffff fffffa80`00000000 fffffa80`06a9fb60 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`09909a90 fffff800`03171dcf : fffff8a0`1015ea20 00000000`00000001 00000000`00000000 fffffa80`06a9fb60 : nt!MmCleanProcessAddressSpace+0x62f
fffff880`09909ae0 fffff800`0314985b : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`09909ba0 fffff800`02e8b993 : fffffa80`0a66b060 fffff880`00000000 00000000`7efdb000 fffffa80`06a9fb60 : nt!NtTerminateProcess+0x25b
fffff880`09909c20 00000000`7705001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0027e228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7705001a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33906
fffff800`02efff9e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33906
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa800425f880
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WINWORD.EXE
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002efff9e to fffff80002e8c740
STACK_TEXT:
fffff880`099098c8 fffff800`02efff9e : 00000000`0000001a 00000000`00041790 fffffa80`0425f880 00000000`0000ffff : nt!KeBugCheckEx
fffff880`099098d0 fffff800`02e5fc23 : ffffffff`00000000 00000000`0ecdffff fffffa80`00000000 fffffa80`06a9fb60 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`09909a90 fffff800`03171dcf : fffff8a0`1015ea20 00000000`00000001 00000000`00000000 fffffa80`06a9fb60 : nt!MmCleanProcessAddressSpace+0x62f
fffff880`09909ae0 fffff800`0314985b : 00000000`00000000 00000000`00000001 00000000`7efdb000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`09909ba0 fffff800`02e8b993 : fffffa80`0a66b060 fffff880`00000000 00000000`7efdb000 fffffa80`06a9fb60 : nt!NtTerminateProcess+0x25b
fffff880`09909c20 00000000`7705001a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0027e228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7705001a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33906
fffff800`02efff9e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33906
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
Followup: MachineOwner
---------
Результат анализа kdfe:
читать дальше »
Код:
Analyzing "C:\Windows\Minidump\013111-69092-01.dmp", please wait... Done.
Crash date: Mon Jan 31 11:42:49.068 2011 (GMT+2)
Stop error code: 0x1a_41790
Process name: WINWORD.EXE
Probably caused by: ntkrnlmp.exe ( nt:FNODOBFM::`string'+33906 )